Blogs


blog post
Surprised by a Compliance Deadline? How to Use the 80/20 Rule for Success

How to boil compliance mandates down to three key areas, using the “80/20 Rule.”

CCPA Classification Data privacy Data Protection Data Security GDPR Regulation risk management Sensitive Data sensitive data management

blog post
What’s (Likely) Missing From Your Cybersecurity M&A Checklist

Cybersecurity due diligence has become an essential element of mergers and acquisition (M&A).

Classification Data privacy Data Protection Data Security GDPR risk management Sensitive Data sensitive data management

blog post
How Security Leaders Direct Operations

How security leaders effectively direct operations during a digital transformation.

Breaches CCPA Classification data breach Data privacy Data Protection Data Security DLP Regulation risk management Sensitive Data sensitive data management

blog post
4 Steps to Justify Security Software to the Board

4 steps for CISOs to present budget to Board of Directors

Breaches CCPA Classification consumer privacy data breach Data privacy Data Protection Data Security DLP GDPR PCI-DSS Regulation risk management Sensitive Data sensitive data management

blog post
For Security Officers, Collaboration Can Be Costly

Collaboration applications can be a data security problem

Breaches Classification data breach Data Security Sensitive Data sensitive data management

blog post
Cyber Security Assessment Tool [New 2019]

A new tool to provide easy execution of the FFIEC CAT framework [2019]

Breaches Classification consumer privacy data breach Data privacy Data Protection Data Security DLP Regulation risk management Sensitive Data sensitive data management

blog post
4 Steps CISOs Use To Optimize Data Security

4 Steps CISOs Use To Optimize Data Security

Breaches Classification consumer privacy data breach Data privacy Data Protection Data Security DLP Regulation risk management Sensitive Data sensitive data management Sensitive Data Manager

blog post
CISO Update On Top Security Incidents

Top Security Incidents for 2018

Classification consumer privacy data breach Data privacy Data Protection Data Security DLP Regulation risk management Sensitive Data sensitive data management