Blogs


blog post
How to implement a Zero Trust framework

Modern technology has brought about a rapid rise in cloud computing and remote work. Additionally, cybercrime is expected to cost…

Data Protection Data Security

blog post
Shopping for data loss prevention software? Ask these 5 questions before making your decision

Buying a data loss prevention (DLP) software solution can be a significant investment. Before you decide on a specific DLP…

DLP

blog post
What is IP theft and how to prevent it from happening

Sensitive data comes in many forms, and much of it—like the personal, health, and financial information of employees and customers—is…

Data Protection Data Security

blog post
DLM and ILM Practices Must Meet Data Privacy Laws

Data lifecycle management (DLM) and information lifecycle management (ILM) are common IT practices within today’s enterprises. Organizations implement them for…

CCPA Classification GDPR Sensitive Data

blog post
Spirion to add data retention schedules to its leading data protection platform

Inform Remediation of Sensitive/Restricted Data with global Data Retention Schedules Spirion, a pioneer in data protection and compliance, today announced…

Data Protection Data Security Newsworthy Press Release

blog post
Best practices for securing dark data

Dark data is an all-encompassing descriptor for the unorganized, untagged, and otherwise unused  data within an organization’s data estate. It…

Data Protection Data Security

blog post
What is data exfiltration?

Data exfiltration is the unauthorized removal of data from computer systems or other devices. Data exfiltration may result from either…

Data Security

blog post
Data privacy and compliance: Looking ahead

The world of data privacy is ever-evolving, and with more and more countries not only proposing privacy legislation but actually…

CCPA GDPR Newsworthy Regulation