Blogs

blog post
How to implement a Zero Trust framework

Modern technology has brought about a rapid rise in cloud computing and remote work. Additionally, cybercrime is expected to cost…

Data Protection Data Security

blog post
What is IP theft and how to prevent it from happening

Sensitive data comes in many forms, and much of it—like the personal, health, and financial information of employees and customers—is…

Data Protection Data Security

blog post
DLM and ILM Practices Must Meet Data Privacy Laws

Data lifecycle management (DLM) and information lifecycle management (ILM) are common IT practices within today’s enterprises. Organizations implement them for…

Compliance & Regulations Data Management & Governance Sensitive Data

blog post
Spirion to add data retention schedules to its leading data protection platform

Inform Remediation of Sensitive/Restricted Data with global Data Retention Schedules Spirion, a pioneer in data protection and compliance, today announced…

Data Protection Data Security

blog post
Best practices for securing dark data

Dark data is an all-encompassing descriptor for the unorganized, untagged, and otherwise unused  data within an organization’s data estate. It…

Data Protection Data Security

blog post
What is data exfiltration?

Data exfiltration is the unauthorized removal of data from computer systems or other devices. Data exfiltration may result from either…

Data Security

blog post
Data privacy and compliance: Looking ahead

The world of data privacy is ever-evolving, and with more and more countries not only proposing privacy legislation but actually…

Compliance & Regulations

blog post
What is Zero Trust?

While enterprises have rapidly embraced cloud computing in the last decade or so, the mass shift to remote work accelerated…

Data Security