Quantcast
Channel: Titus Blog - Titus
Browsing latest articles
Browse All 233 View Live

Why You Need A Specialist Provider – Sophisticated and Flexible Metadata

We’ve already looked at why you need a labeling policy that reflects the way data is used around the business in part 1 of this series. Now, in part 2 of our series on why you need a specialist...

View Article



Why You Need A Specialist Provider – A Single Vendor Approach Can Hinder Data...

In this series, we’re looking at why you need a specialist provider when it comes to data classification. We’ve already looked at why you need a labeling policy that reflects the way data is used...

View Article

Why You Need A Specialist Provider – Getting The Product Support You Need 

In this series, we’re looking at why you need a specialist provider when it comes to data classification. We’ve already looked at why you need a labeling policy that reflects the way data is used...

View Article

Data Privacy vs. Data Security: What’s the Difference?

Understandably, the terms data security and data privacy are frequently muddled together and sometimes used interchangeably. While they are naturally connected, they are also unique and separate...

View Article

Image may be NSFW.
Clik here to view.

Take the best-of-breed track to implementing data classification

Download our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus.

View Article


Key Considerations in The Ever-Evolving Data Privacy Landscape –...

Stringent privacy rules are emerging worldwide. Increasingly, security, risk, and privacy professionals believe that maintaining compliance with global privacy regulations is one of their top...

View Article

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest...

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...

View Article

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal...

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...

View Article


Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data...

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...

View Article


Key Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit...

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your...

View Article

The Importance of Automation in Data Classification

It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective...

View Article

Dark Data: Out of Sight, Out of Mind

Businesses are creating and collecting more data than ever. Far too much of this data is saved and stored – on file shares, network drives, and cloud services – “just in case” it happens to be needed...

View Article

Emerging Privacy Regulations in the United States

Around the world, the demand for adequate data protection is ever increasing, and globally, action is being taken. With each new data protection compliance regulation that comes into effect, the way...

View Article


Data Classification: The Impact on a Zero Trust Framework

At first glance, it appears that data classification and Zero Trust, a cybersecurity framework, would have nothing to do with one another. After all, each has their own separate specialized function –...

View Article

Data Classification in the Finance World

When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face immense pressure to protect the data they are creating,...

View Article


Understanding and Protecting CUI

The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more efficiently, but it also means less control over shared...

View Article

Image may be NSFW.
Clik here to view.

The Magical Implementation – Picking the Right Assistant(s)

A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...

View Article


Image may be NSFW.
Clik here to view.

The CMMC Program

As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC)...

View Article

The Magical Implementation – Awareness, Safety Crews, and Plans for...

A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...

View Article

Guarding Against Insider Threats

When you see or hear the term “data breach” in the media, is the first thought that there must have been a hacker involved? It may surprise you to know that hackers actually aren’t the main cause of...

View Article

“See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats –...

What comes to mind when you hear the term “cybersecurity”? Chances are, you think of devices, AI, automation, networks, etc. working to protect valuable information, data, and assets from cyber...

View Article


Data Protection Myths and the Truths Behind Them

To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at...

View Article


The Magical Implementation – Preshow Audience

A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...

View Article

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

Title: Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and...

View Article

What Is the Cybersecurity Maturity Model Certification (CMMC)?

What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To? The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive assessment framework and certification...

View Article


What Is ISO 27001 and How Can It Help Your Organization?

What Is ISO 27001? Everything You Need To Know About ISO 27001:2022 ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing...

View Article

The Magical Implementation – It Pays To Advertise

A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most...

View Article

What Is the Federal Risk and Authorization Management Program (FedRAMP)?

An Introduction to FedRAMP In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program...

View Article

Complying With the Export Administration Regulations (EAR): Everything You...

The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for...

View Article



What is India’s Personal Data Protection Bill (PDPB)? Rights,...

India is the second-largest internet market in the world, with more than 760 million active internet users. While the Supreme Court of India recognized the right to privacy in a 2017 verdict, India has...

View Article
Browsing latest articles
Browse All 233 View Live


Latest Images