A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
Secure business data in the cloud using encryption, access controls, monitoring tools, and multi-cloud strategies to reduce ...
Data serves as the lifeblood of most businesses today, and safeguarding its security is imperative. I believe this commitment is not merely an obligation to uphold ethical and legal standards; it also ...
Archimedes famously said the quickest route between two points is a straight line. He meant geometry, though I argue this concept applies seamlessly to data security. To secure data in enterprise ...
Data security posture management (DSPM) tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data loss. Tracking down sensitive data across your ...
A week rarely goes by without a major data security breach. Recent news includes a breach impacting an energy company’s 8 million customers, another compromising the information on 450,000 current and ...