Blogs
8 Steps Security Leaders Follow to Classify Sensitive Data
Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.
By Ryan Tully on July 11, 2019
Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data
4 Steps to Justify Security Software to the Board
4 steps for CISOs to present budget to Board of Directors
By Ryan Tully on May 29, 2019
Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data
Airline E-ticketing vulnerability exposes passenger PII
Airline e-ticket systems can expose customer PII via unencrypted check-in links that hackers can easily intercept.
By Ryan Tully on March 14, 2019
Sensitive Data
4 Sensitive Data Security Questions You Should Ask Yourself
Every organization is different and how they handle their sensitive data is just as diverse. But every organization, no matter…
By Ryan Tully on February 28, 2019
Sensitive Data