Blogs
Squaring the Schrems II Circle With Geo-Fencing
About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…
By Ryan Tully on August 18, 2021
Data Management & Governance
The Transatlantic Digital Divide: How Data Classification Can Ease Data Privacy Tensions, Post-Schrems II
About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…
By Ryan Tully on August 18, 2021
Data Management & Governance
Ten Steps to an Effective Data Protection Program
What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…
By Ryan Tully on June 16, 2021
Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data
Ensuring Data Privacy While Preserving Data Integrity
Organizations rely on data to make strategic decisions—but if you can’t trust the accuracy and integrity of your data, how…
By Ryan Tully on May 20, 2021
Data Management & Governance Data Privacy
How valuable is your data?
About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…
By Ryan Tully on April 9, 2021
Data Management & Governance Sensitive Data
8 Steps Security Leaders Follow to Classify Sensitive Data
Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.
By Ryan Tully on July 11, 2019
Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data