Blogs

blog post
4 Sensitive Data Security Questions You Should Ask Yourself

Every organization is different and how they handle their sensitive data is just as diverse. But every organization, no matter…

Sensitive Data

blog post
DATA…DATA EVERYWHERE…NO SECURITY TO SPARE

According to our friends at the Ponemon Institute, 65 percent of info security pros would like to store object data…

Data Security

blog post
Is Access Management Replacing Firewalls?

The landscape of the traditional perimeter security model is changing as many market segments, such as financial services, march toward…

Sensitive Data

blog post
HIPAA Enforcement Update: Cracking Down on Blocking and Noncompliance

Two units of the Department of Health and Human Services (HHS) — the Office of the National Coordinator for Health…

Compliance & Regulations

blog post
Healthcare Cybersecurity and Privacy Remain Top of Mind in 2019

HIMSS released a report focusing on healthcare cybersecurity trends for 2019 including electronic health records (EHR) and protected health information…

Cybersecurity Data Privacy

blog post
7 Benefits of Making Data-at-Rest Part of Your Security Solution

It’s startling, but in 2017 more than 16 million Americans reported having their identities stolen. In response, federal and state…

Sensitive Data

blog post
A Deep Dive into the Ohio Data Protection Act – Your Questions, Answered.

NOTE: While the webcast and our published materials are an analysis of this new law, they are not legal advice;…

Compliance & Regulations

blog post
Oklahoma Breach Exposes Decades Old Records

In December of last year, the Oklahoma Securities Commission learned that millions of sensitive files were left publicly exposed on…

Data Breach