Blogs

blog post
Business data security guide (measures, risks & precautions)

Businesses collect and store important data on a daily basis — anywhere from their customers’ personal information to private financial…

Data Protection Data Security

blog post
Why Florida’s new Cybersecurity Operations Center law is relevant to battling cybercrime

On June 29, Florida governor Ron DeSantis signed into law H.B. 1297, a bill designed to assist the state in…

Data Privacy Data Protection Data Security

blog post
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier

The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…

Data Privacy Data Protection Data Security Sensitive Data

blog post
What is Big Data Security?

Nowadays, it’d be pretty difficult to find an enterprise that doesn’t use big data in some capacity for its daily…

Data Security

blog post
Meet Data Compliance Requirements with a Data Protection Plan

In recent years, a whole host of new laws regulating how sensitive information is collected, used, stored, shared, and disposed…

Data Privacy Data Security

blog post
eCommerce Security Threat Outcomes Online Retailers Should Plan For

Online retailers face perpetual cybersecurity threats; this is the reality of our highly digital, data-driven world where those threats grow…

Data Security

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data

blog post
Spirion Data Governance Suite:
Sensitive data needs one clear protector.

About the author With a 15-year career that has spanned telecommunications, geospatial analysis, machine vision and more, Jason Hodgert focuses…

Data Breach Data Privacy Data Protection Data Security