Blogs


blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Classification Sensitive Data

blog post
Squaring the Schrems II Circle With Geo-Fencing

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Classification

blog post
The Transatlantic Digital Divide: How Data Classification Can Ease Data Privacy Tensions, Post-Schrems II

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Classification

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Breaches Classification data breach Data Security DLP PCI-DSS Regulation risk management sensitive data management

blog post
Data classification de-mystified via automation

About the author With a 15-year career that has spanned telecommunications, geospatial analysis, machine vision and more, Jason Hodgert focuses…

Classification

blog post
Automating Data Discovery and Data Classification for Enhanced Privacy

Data discovery and data classification go hand in hand when creating your data security plan. Each function serves an essential…

Classification Data Protection

blog post
How to determine the sensitivity of information

Not all data is created equally — which is why it’s integral for organizations’ security teams to proactively identify, assess…

Classification sensitive data management

blog post
How valuable is your data?

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Classification Sensitive Data