Blogs

blog post
What is an Insider Attack?

Insider cyber attacks are a common cause of data breaches, and the volume of attacks, as well as the overall…

Data Security

blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Data Management & Governance Sensitive Data

blog post
Endpoint Security Software Shopping Guide

As businesses of all sizes enact digital transformation strategies and permanent remote work policies, the need to protect the endpoint…

Data Protection Data Security Sensitive Data

blog post
Why Florida’s new Cybersecurity Operations Center law is relevant to battling cybercrime

On June 29, Florida governor Ron DeSantis signed into law H.B. 1297, a bill designed to assist the state in…

Data Privacy Data Protection Data Security

blog post
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier

The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…

Data Privacy Data Protection Data Security Sensitive Data

blog post
Spirion Data Governance Suite:
Sensitive data needs one clear protector.

About the author With a 15-year career that has spanned telecommunications, geospatial analysis, machine vision and more, Jason Hodgert focuses…

Data Breach Data Privacy Data Protection Data Security

blog post
How valuable is your data?

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Data Management & Governance Sensitive Data

blog post
How to leverage data inventories to achieve CCPA and GDPR compliance success

Data inventories are directories for managing sensitive data throughout an enterprise. Organizations can leverage those inventories to achieve and maintain…

Compliance & Regulations Sensitive Data