Blogs
How valuable is your data?
About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…
By Ryan Tully on April 9, 2021
Data Management & Governance Sensitive Data
How to leverage data inventories to achieve CCPA and GDPR compliance success
Data inventories are directories for managing sensitive data throughout an enterprise. Organizations can leverage those inventories to achieve and maintain…
By Ryan Tully on March 8, 2021
Compliance & Regulations Sensitive Data
How to minimize risk after the Blackbaud data breach
Breaches affect not only the company whose data was stolen, but also every company whose data they store, manage, or…
By Ryan Tully on August 10, 2020
Data Breach Sensitive Data
Cal State CISO discusses protecting sensitive data for half a million people
During this week’s “Privacy Please” podcast, Cameron Ivey and Gabe Gumbs chatted with Ed Hudson, the Chief Information and Security…
By Ryan Tully on June 12, 2020
Compliance & Regulations Sensitive Data
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 3
Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.
By Ryan Tully on September 11, 2019
Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data
Sodinokibi – Communication strategies for dealing with Ransomware
Ransomware is back in the news. Although you have likely never lost sight of the threat that it poses to…
By Ryan Tully on August 23, 2019
Cybersecurity Data Privacy Data Protection Data Security Sensitive Data
8 Steps Security Leaders Follow to Classify Sensitive Data
Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.
By Ryan Tully on July 11, 2019
Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data
What’s (Likely) Missing From Your Cybersecurity M&A Checklist
Cybersecurity due diligence has become an essential element of mergers and acquisition (M&A).
By Ryan Tully on June 19, 2019
Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data