NIST Privacy Framework : Our Essential Data Protection Guide

Close

Blogs

blog post
Supply chain attacks: Examples and how to defend

When you combine third-party vendors that provide service to multiple enterprises with the sheer volume of data these enterprises possess…

Data Breach Data Security

blog post
The lucrative cost of cybercrime of PII

As the rate of data breaches increases year over year, the sale of personally identifiable information (PII) is becoming more…

Data Breach Sensitive Data

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data

blog post
Spirion Data Governance Suite:
Sensitive data needs one clear protector.

About the author With a 15-year career that has spanned telecommunications, geospatial analysis, machine vision and more, Jason Hodgert focuses…

Data Breach Data Privacy Data Protection Data Security

blog post
How to refocus your cybersecurity team’s assumption of compromise paradox to a data protection model

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Data Breach Data Protection Data Security Uncategorized

blog post
Healthcare under attack: How backup systems make or break your response to ransomware

When the global pandemic began to impact the U.S. with shut downs and concerns about the ability for medical facilities…

Data Breach Data Privacy Data Protection Data Security Uncategorized

blog post
How to minimize risk after the Blackbaud data breach

Breaches affect not only the company whose data was stolen, but also every company whose data they store, manage, or…

Data Breach Sensitive Data

blog post
How Security Leaders Direct Operations

How security leaders effectively direct operations during a digital transformation.

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data