Blogs

blog post
Endpoint Security Software Shopping Guide

As businesses of all sizes enact digital transformation strategies and permanent remote work policies, the need to protect the endpoint…

Data Protection Data Security Sensitive Data

blog post
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier

The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…

Data Privacy Data Protection Data Security Sensitive Data

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data

blog post
How to determine the sensitivity of information

BLOG How to Determine the Sensitivity of Information BY RYAN TULLYSeptember 30, 2024 Not all data is created equally —…

Data Management & Governance Sensitive Data

blog post
How valuable is your data?

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Data Management & Governance Sensitive Data

blog post
How to leverage data inventories to achieve CCPA and GDPR compliance success

Data inventories are directories for managing sensitive data throughout an enterprise. Organizations can leverage those inventories to achieve and maintain…

Compliance & Regulations Sensitive Data

blog post
How to minimize risk after the Blackbaud data breach

Breaches affect not only the company whose data was stolen, but also every company whose data they store, manage, or…

Data Breach Sensitive Data

blog post
Cal State CISO discusses protecting sensitive data for half a million people

During this week’s “Privacy Please” podcast, Cameron Ivey and Gabe Gumbs chatted with Ed Hudson, the Chief Information and Security…

Compliance & Regulations Sensitive Data