Blogs
Understanding malicious insider threat examples to avoid an insider attack
In 2020, insider threats were responsible for 60% of data breaches. Insider threats occur when an employee’s privileged access is…
By Spirion on November 10, 2021
Data Security Sensitive Data
7 Things to Consider When Classifying Your Sensitive Data
Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…
By Ryan Tully on October 20, 2021
Data Management & Governance Sensitive Data
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier
The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…
By Spirion on July 20, 2021
Data Privacy Data Protection Data Security Sensitive Data
Ten Steps to an Effective Data Protection Program
What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…
By Ryan Tully on June 16, 2021
Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data
How valuable is your data?
About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…
By Ryan Tully on April 9, 2021
Data Management & Governance Sensitive Data
How to leverage data inventories to achieve CCPA and GDPR compliance success
Data inventories are directories for managing sensitive data throughout an enterprise. Organizations can leverage those inventories to achieve and maintain…
By Ryan Tully on March 8, 2021
Compliance & Regulations Sensitive Data