Blogs

blog post
GDPR Compliance Post-Mortems: Lessons Learned from Facebook, Uber, and Others – Part 2

Since the EU General Data Protection Regulation (GDPR) went into force in May of 2018, several organizations have received substantial…

Compliance & Regulations

blog post
The Final CCPA Amendments Are In

The Final CCPA Amendments Are In.  What They Mean To You. On Friday, October 11, California Governor Gavin Newsom signed…

Compliance & Regulations

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 3

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 2

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 1

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security

blog post
Sodinokibi – Communication strategies for dealing with Ransomware

Ransomware is back in the news. Although you have likely never lost sight of the threat that it poses to…

Cybersecurity Data Privacy Data Protection Data Security Sensitive Data

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
How Security Leaders Direct Operations

How security leaders effectively direct operations during a digital transformation.

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data