Why You Need A Specialist Provider – Sophisticated and Flexible Metadata
We’ve already looked at why you need a labeling policy that reflects the way data is used around the business in part 1 of this series. Now, in part 2 of our series on why you need a specialist...
View ArticleWhy You Need A Specialist Provider – A Single Vendor Approach Can Hinder Data...
In this series, we’re looking at why you need a specialist provider when it comes to data classification. We’ve already looked at why you need a labeling policy that reflects the way data is used...
View ArticleWhy You Need A Specialist Provider – Getting The Product Support You Need
In this series, we’re looking at why you need a specialist provider when it comes to data classification. We’ve already looked at why you need a labeling policy that reflects the way data is used...
View ArticleData Privacy vs. Data Security: What’s the Difference?
Understandably, the terms data security and data privacy are frequently muddled together and sometimes used interchangeably. While they are naturally connected, they are also unique and separate...
View ArticleTake the best-of-breed track to implementing data classification
Download our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus.
View ArticleKey Considerations in The Ever-Evolving Data Privacy Landscape –...
Stringent privacy rules are emerging worldwide. Increasingly, security, risk, and privacy professionals believe that maintaining compliance with global privacy regulations is one of their top...
View ArticleKey Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest...
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...
View ArticleKey Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal...
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...
View ArticleKey Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data...
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...
View ArticleKey Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit...
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...
View ArticleThe Importance of Automation in Data Classification
It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective...
View ArticleDark Data: Out of Sight, Out of Mind
Businesses are creating and collecting more data than ever. Far too much of this data is saved and stored – on file shares, network drives, and cloud services – “just in case” it happens to be needed...
View ArticleEmerging Privacy Regulations in the United States
Around the world, the demand for adequate data protection is ever increasing, and globally, action is being taken. With each new data protection compliance regulation that comes into effect, the way...
View ArticleData Classification: The Impact on a Zero Trust Framework
At first glance, it appears that data classification and Zero Trust, a cybersecurity framework, would have nothing to do with one another. After all, each has their own separate specialized function –...
View ArticleData Classification in the Finance World
When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face immense pressure to protect the data they are creating,...
View ArticleUnderstanding and Protecting CUI
The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more efficiently, but it also means less control over shared...
View ArticleThe Magical Implementation – Picking the Right Assistant(s)
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...
View ArticleThe CMMC Program
As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC)...
View ArticleThe Magical Implementation – Awareness, Safety Crews, and Plans for...
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...
View ArticleGuarding Against Insider Threats
When you see or hear the term “data breach” in the media, is the first thought that there must have been a hacker involved? It may surprise you to know that hackers actually aren’t the main cause of...
View Article“See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats –...
What comes to mind when you hear the term “cybersecurity”? Chances are, you think of devices, AI, automation, networks, etc. working to protect valuable information, data, and assets from cyber...
View ArticleData Protection Myths and the Truths Behind Them
To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at...
View ArticleThe Magical Implementation – Preshow Audience
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...
View ArticleLookout and Fortra Partner to Secure Sensitive Data Across the Enterprise
Title: Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and...
View ArticleWhat Is the Cybersecurity Maturity Model Certification (CMMC)?
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To? The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive assessment framework and certification...
View ArticleWhat Is ISO 27001 and How Can It Help Your Organization?
What Is ISO 27001? Everything You Need To Know About ISO 27001:2022 ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing...
View ArticleThe Magical Implementation – It Pays To Advertise
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...
View ArticleWhat Is the Federal Risk and Authorization Management Program (FedRAMP)?
An Introduction to FedRAMP In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program...
View ArticleComplying With the Export Administration Regulations (EAR): Everything You...
The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for...
View ArticleWhat is India’s Personal Data Protection Bill (PDPB)? Rights,...
India is the second-largest internet market in the world, with more than 760 million active internet users. While the Supreme Court of India recognized the right to privacy in a 2017 verdict, India has...
View Article