Discover and Protect Crown Jewel Data
Our new data security capabilities are empowering organizations to reduce risk, protect their crown jewels and get unprecedented coverage and visibility across their enterprise data environment. How? By …
Our new data security capabilities are empowering organizations to reduce risk, protect their crown jewels and get unprecedented coverage and visibility across their enterprise data environment. How? By …
2018 was a watershed year for privacy. The passage of the EU GDPR ushered in a new era in which data privacy became a first-order data security and …
It’s rare to spot a flip phone these days when smartphones are practically ubiquitous. Yet, in the realm of data security, where precision and context are critical, too …
The New York Department of Financial Services (DFS) Cybersecurity Regulation sets new standards for financial services firms doing business in the State of New York to identify and …
Big Data creates big problems for finding identity information. As organizations shift to predominantly online interactions with their customers, they are collecting petabytes of data about individuals at …
The best way to know your customer is to know their data. Every year organizations collect exponentially more personal information on their customers and clients but often lack …
In the world of data privacy, the European Union General Data Protection Regulation has grabbed all the headlines. As much of a landmark piece of legislation the EU …
The adoption of Privacy Shield by US and EU regulatory authorities, the successor to Safe Harbor that has governed the transfer of personal data between the US, Canada …
The growing incidence of breaches to extract user customer account credentials and more expansive breach notification requirements put enterprises between a rock and a hard place. They are …
Privacy management sits at the intersection of information security, data management and analytics, but is more than the sum of the parts. It’s been a longstanding point of …