Blogs

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
4 Steps to Justify Security Software to the Board

4 steps for CISOs to present budget to Board of Directors

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Airline E-ticketing vulnerability exposes passenger PII

Airline e-ticket systems can expose customer PII via unencrypted check-in links that hackers can easily intercept.

Sensitive Data

blog post
4 Sensitive Data Security Questions You Should Ask Yourself

Every organization is different and how they handle their sensitive data is just as diverse. But every organization, no matter…

Sensitive Data

blog post
7 Benefits of Making Data-at-Rest Part of Your Security Solution

It’s startling, but in 2017 more than 16 million Americans reported having their identities stolen. In response, federal and state…

Sensitive Data

blog post
6 Steps for Protecting Your Intellectual Property

With all the focus on compliance requirements—PII, PCI-DSS, HIPAA, GDPR, and a plethora of other regulations—one of your company’s most…

Sensitive Data