Blogs


blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Breaches Classification data breach Data Security DLP PCI-DSS Regulation risk management sensitive data management

blog post
Regine Bonneau, CEO and Founder of cyber-risk company, discusses consumer rights and an organization’s responsibility in privacy

Regine Bonneau’s journey into technology and privacy started when she was 12 and signed up for robotics at school because…

Podcast risk management

blog post
Sodinokibi – Communication strategies for dealing with Ransomware

Ransomware is back in the news. Although you have likely never lost sight of the threat that it poses to…

Data privacy Data Protection Data Security risk management Sensitive Data

blog post
Find Data and Gain Visibility as the First Step in Data Security

The biggest challenge security architects are faced with is the lack of visibility and where data is hidden in the enterprise.

Classification Data Security Regulation risk management Sensitive Data sensitive data management

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Classification Data privacy Data Protection Data Security risk management Sensitive Data sensitive data management

blog post
Surprised by a Compliance Deadline? How to Use the 80/20 Rule for Success

How to boil compliance mandates down to three key areas, using the “80/20 Rule.”

CCPA Classification Data privacy Data Protection Data Security GDPR Regulation risk management Sensitive Data sensitive data management

blog post
What’s (Likely) Missing From Your Cybersecurity M&A Checklist

Cybersecurity due diligence has become an essential element of mergers and acquisition (M&A).

Classification Data privacy Data Protection Data Security GDPR risk management Sensitive Data sensitive data management

blog post
How Security Leaders Direct Operations

How security leaders effectively direct operations during a digital transformation.

Breaches CCPA Classification data breach Data privacy Data Protection Data Security DLP Regulation risk management Sensitive Data sensitive data management