Blogs

blog post
Squaring the Schrems II Circle With Geo-Fencing

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
The Transatlantic Digital Divide: How Data Classification Can Ease Data Privacy Tensions, Post-Schrems II

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
Remote Endpoint Device Data Security Implications

Prior to March 2020, remote work wasn’t exactly the norm. Yes, more and more companies were starting to embrace it…

Data Security

blog post
Data security considerations for your digital transformation strategy

There’s all sorts of technology currently available that aims to help businesses digitally transform their processes and operations to run…

Data Privacy

blog post
Why Florida’s new Cybersecurity Operations Center law is relevant to battling cybercrime

On June 29, Florida governor Ron DeSantis signed into law H.B. 1297, a bill designed to assist the state in…

Data Privacy Data Protection Data Security

blog post
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier

The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…

Data Privacy Data Protection Data Security Sensitive Data

blog post
What is Big Data Security?

Nowadays, it’d be pretty difficult to find an enterprise that doesn’t use big data in some capacity for its daily…

Data Security

blog post
Securing customer data in an e-commerce environment

Thanks to the pandemic, e-commerce has become the de facto business model all over the world. While this has opened…

Data Privacy Data Protection