Blogs

blog post
GLBA Compliance Requirements for Financial Services

GLBA, also known as the Gramm-Leach-Bliley Act, is a federal law that enacted in 1999 to regulate how financial institutions handle the nonpublic personal information (NPI) they collect on their customers and consumers.

Compliance & Regulations

blog post
GLBA Compliance Checklist for Financial Services

Follow this checklist for Gramm-Leach-Bliley Act (GLBA) compliance if you’re a financial institution or a business that provides financial services.This is the essential GLBA compliance checklist for financial services. Plus learn how data discovery, dark data, and compliance play crucial roles in ensuring regulatory compliance.

Compliance & Regulations Data Privacy

blog post
What to Know About the Colorado Privacy Act

Learn what you need to know about the Colorado Privacy Act (CPA) and how it will affect your business. Discover insights on enforcement, scope, and other laws like this at state and federal levels.

Data Privacy

blog post
Is Your Data Protection Software Privacy-Grade?

Discover the importance of privacy-grade data protection software and learn how to assess your current solution. Ask these key questions to determine if your data protection software meets the privacy standards you need. Find out now!

Data Protection

blog post
How Sensitive Data Discovery Tools Help with PCI Compliance

The amount of sensitive data that organizations gather and store increases daily, and it needs to be protected in order to comply with federal data privacy laws. In general, these standards regulate how sensitive data gets collected and ensure its security.

Compliance & Regulations Sensitive Data

blog post
How to Use 80/20 Rule to Meet Compliance Deadlines

How to boil compliance mandates down to three key areas, using the “80/20 Rule.”

Compliance & Regulations

blog post
SPIglass Dashboard: A Key Tool for Informed Executive Decisions

Spirion’s SPIglass dashboard can streamline risk management efforts and help executives confidently make data-driven decisions to protect their business.

Data Management & Governance Sensitive Data

blog post
Reactive vs. Proactive Data Breach Incident Response: What’s the Difference?

Reactive and proactive incident response are two different strategies for responding to a security incident. Do you know the difference?

Data Breach Data Protection