Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.
Ransomware is back in the news. Although you have likely never lost sight of the threat that it poses to interrupting your business. As part of your larger protection strategy your teams have implemented awareness training, enabled strong spam filters, locked down privileged accounts, configured access controls and many additional tactical measures to mitigate the impact of an outbreak. As observed last week in Texas, over 20 cities were hit…
The biggest challenge security architects are faced with is the lack of visibility and where data is hidden in the enterprise.
Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.
How to boil compliance mandates down to three key areas, using the “80/20 Rule.”
Cybersecurity due diligence has become an essential element of mergers and acquisition (M&A).
How security leaders effectively direct operations during a digital transformation.
4 steps for CISOs to present budget to Board of Directors
Collaboration applications can be a data security problem
A new tool to provide easy execution of the FFIEC CAT framework