|
This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.
|
|
|
This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.
|
|
|
The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...
|
|
|
TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.
|
|
|
According to the latest Netwrix, concerns around data security have been encouraging 46% of organizations to move their personally identifiable information (PII) back on...
|
|
|
Quest Software’s new add-on module, Toad for Oracle Standard Data Protection (SDP), automates the detection and remediation of potential violations of data privacy...
|
|
|
Varonis reports that even after GDPR, businesses still are failing to effectively protect sensitive data.
|
|
|
Using the cloud has become second nature for today’s organizations, and in most cases, cloud enthusiasts report an overall security improvement. However, DLP remains an issue.
|
|
|
The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves from...
|
|
|
Read this Executive Brief to understand why insider threats are an important risk that your organization needs to consider when building its security strategy.
|
|