Discover and Protect Crown Jewel Data

Our new data security capabilities are empowering organizations to reduce risk, protect their crown jewels and get unprecedented coverage and visibility across their enterprise data environment. How? By building on a discovery-in-depth approach for identifying any kind of sensitive or personal data anywhere inside a modern data landscape: from data at rest to data in … Continued

2019: Global Privacy Gets Personal

2018 was a watershed year for privacy. The passage of the EU GDPR ushered in a new era in which data privacy became a first-order data security and governance problem warranting corporate attention and investment. This is not to say that the profession of privacy began last year. Quite the opposite.  Regulations covering privacy protection … Continued

Rethinking Data Classification For The New Era of Privacy

It’s rare to spot a flip phone these days when smartphones are practically ubiquitous.  Yet, in the realm of data security, where precision and context are critical, too many are still using flip phone technology to discover, understand and classify personal data. In the flip phone era, classification was intended as a means to an … Continued

NY Department of Financial Services New Cyber Imperative: Protect Your Customer Data

The New York Department of Financial Services (DFS) Cybersecurity Regulation sets new standards for financial services firms doing business in the State of New York to identify and mitigate risk to their business and consumer data. But for all the organizational and technical requirements — like a board-approved cybersecurity program — the real impact of … Continued

Where’s Waldo: Finding Identity in Big Data

Big Data creates big problems for finding identity information. As organizations shift to predominantly online interactions with their customers, they are collecting petabytes of data about individuals at evermore breakneck pace. Organizations want to quickly respond and even anticipate their customer’s’ needs. That means increasingly surrounding their customers with digital services across Web, mobile, home, … Continued

The Case for Data-Driven Data Mapping

The best way to know your customer is to know their data. Every year organizations collect exponentially more personal information on their customers and clients but often lack even basic accounting for the information ingested, processed or disposed. For most organizations personal data underpins their relationship with their customers. Preserving the trust of those customers … Continued

Privacy Babel: Making Sense of Global Privacy Regulations

In the world of data privacy, the European Union General Data Protection Regulation has grabbed all the headlines. As much of a landmark piece of legislation the EU GDPR is for any company or organization that stores or processes EU citizen data, it’s by no means the only one that global organizations must now navigate. … Continued

Can Privacy (Shield) Evolve From Trust To Verify?

The adoption of Privacy Shield by US and EU regulatory authorities, the successor to Safe Harbor that has governed the transfer of personal data between the US, Canada and the EU for over a decade, has come as an anti-climax, leaving plenty of uncertainty in its wake. The biggest sticking point for EU privacy advocates … Continued

Death, Taxes and Breaches; Managing for the Inevitable.

The growing incidence of breaches to extract user customer account credentials and more expansive breach notification requirements put enterprises between a rock and a hard place. They are subject to the cruel logic that a breach of one provider can result in the compromise of customer accounts at another because of user password reuse — … Continued

Privacy v. Security | TL;DR

Privacy management sits at the intersection of information security, data management and analytics, but is more than the sum of the parts. It’s been a longstanding point of contention within information security circles that compliance does not equal security. Certainly, devastating data breaches and attackers gaining access to sensitive data at enterprises that were deemed … Continued