Blogs

blog post
How valuable is your data?

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Data Management & Governance Sensitive Data

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 3

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 2

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security

blog post
Leveraging Data Inventories for CCPA and GDPR Compliance – Part 1

Data inventories are directories for managing sensitive data throughout the enterprise. This article shows how to leverage those inventories for compliance with the CCPA, GDPR, and similar laws and regulations.

Compliance & Regulations Data Management & Governance Data Privacy Data Protection Data Security

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
How Security Leaders Direct Operations

How security leaders effectively direct operations during a digital transformation.

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
4 Steps to Justify Security Software to the Board

4 steps for CISOs to present budget to Board of Directors

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
For Security Officers, Collaboration Can Be Costly

Collaboration applications can be a data security problem

Data Breach Data Management & Governance Data Security Sensitive Data