Blogs

blog post
Spirion to add data retention schedules to its leading data protection platform

Inform Remediation of Sensitive/Restricted Data with global Data Retention Schedules Spirion, a pioneer in data protection and compliance, today announced…

Data Protection Data Security

blog post
Best practices for securing dark data

Dark data is an all-encompassing descriptor for the unorganized, untagged, and otherwise unused  data within an organization’s data estate. It…

Data Protection Data Security

blog post
What is data exfiltration?

Data exfiltration is the unauthorized removal of data from computer systems or other devices. Data exfiltration may result from either…

Data Security

blog post
What is Zero Trust?

While enterprises have rapidly embraced cloud computing in the last decade or so, the mass shift to remote work accelerated…

Data Security

blog post
What to include on your cloud migration strategy checklist

With worldwide spending on public cloud services anticipated to hit $362.2 billion in 2022, up from $257.5 billion in 2020,…

Data Security

blog post
Protecting sensitive data from the Internet of Things and its ever-expanding attack frontier

The Internet of Things (IoT) is optimizing everything from homes to businesses to entire industries through the collection and sharing…

Data Security

blog post
Weighing the risk of data breach noncompliance

2021 saw a record number of data breaches, despite 34% of organizations under-reporting them. What does this tell us? Data…

Compliance & Regulations Data Breach Data Security Sensitive Data

blog post
Supply chain attacks: Examples and how to defend

When you combine third-party vendors that provide service to multiple enterprises with the sheer volume of data these enterprises possess…

Data Breach Data Security