NIST Privacy Framework : Our Essential Data Protection Guide

Close

Blogs

blog post
Data Security vs. Data Privacy: Understanding the Key Differences

Data security and data privacy are frequently spoken about in the same breath. However, the two terms are not interchangeable.…

Data Privacy Data Security

blog post
Does your DLP solution protect data using a Zero Trust model?

An essential component of any organization’s data loss prevention process is the implementation of a robust Data Loss Prevention (DLP)…

Data Management & Governance Data Security Sensitive Data

blog post
How to implement a Zero Trust framework

Modern technology has brought about a rapid rise in cloud computing and remote work. Additionally, cybercrime is expected to cost…

Data Protection Data Security

blog post
What is IP theft and how to prevent it from happening

Sensitive data comes in many forms, and much of it—like the personal, health, and financial information of employees and customers—is…

Data Protection Data Security

blog post
Spirion to add data retention schedules to its leading data protection platform

Inform Remediation of Sensitive/Restricted Data with global Data Retention Schedules Spirion, a pioneer in data protection and compliance, today announced…

Data Protection Data Security

blog post
Best practices for securing dark data

Dark data is an all-encompassing descriptor for the unorganized, untagged, and otherwise unused  data within an organization’s data estate. It…

Data Protection Data Security

blog post
What is data exfiltration?

Data exfiltration is the unauthorized removal of data from computer systems or other devices. Data exfiltration may result from either…

Data Security

blog post
What is Zero Trust?

While enterprises have rapidly embraced cloud computing in the last decade or so, the mass shift to remote work accelerated…

Data Security