Blogs

blog post
How Strategic Security Leaders Protect Data In The Cloud

How CISOs protect their sensitive data in the cloud.

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
CISO Facts To Get Budget Approval

How to get your security budget approved to combat security threats.

Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Airline E-ticketing vulnerability exposes passenger PII

Airline e-ticket systems can expose customer PII via unencrypted check-in links that hackers can easily intercept.

Sensitive Data

blog post
4 Sensitive Data Security Questions You Should Ask Yourself

Every organization is different and how they handle their sensitive data is just as diverse. But every organization, no matter…

Sensitive Data

blog post
Is Access Management Replacing Firewalls?

The landscape of the traditional perimeter security model is changing as many market segments, such as financial services, march toward…

Sensitive Data

blog post
7 Benefits of Making Data-at-Rest Part of Your Security Solution

It’s startling, but in 2017 more than 16 million Americans reported having their identities stolen. In response, federal and state…

Sensitive Data

blog post
Data at Rest, Data Loss Prevention for Healthcare

Healthcare Data Security – Data Loss Prevention In the healthcare industry, there is a ton of personal information stored –…

Data Management & Governance Data Protection Sensitive Data

blog post
Another Casualty of Prevalent PHI Breaches

Valley Hope Association’s mission is to help people overcome their dependence on alcohol and drugs. At their 16 addiction treatment…

Data Protection Sensitive Data