Blogs

blog post
4 Steps CISOs Use To Optimize Data Security

4 Steps CISOs Use To Optimize Data Security

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
CISO Facts To Get Budget Approval

How to get your security budget approved to combat security threats.

Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Data at Rest, Data Loss Prevention for Healthcare

Healthcare Data Security – Data Loss Prevention In the healthcare industry, there is a ton of personal information stored –…

Data Management & Governance Data Protection Sensitive Data

blog post
Another Casualty of Prevalent PHI Breaches

Valley Hope Association’s mission is to help people overcome their dependence on alcohol and drugs. At their 16 addiction treatment…

Data Protection Sensitive Data

blog post
Why It’s Easy to Protect Customers and Avoid Equifax’s Mistakes

(by Todd Feinman, CEO and Founder Spirion) Equifax allowed 143 million Social Security Numbers (SSN), Names, Date of Birth (DOB),…

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security

blog post
The role of classification in DLP strategies

 SC magazine released its review of classification solutions and weighed in on its importance in DLP strategies. The full review…

Data Management & Governance Data Privacy Data Protection Data Security