View articles by tag/topic
Latest blog

Enhancing asset management with Enterprise Recon: A data-centric approach
Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks. Effective asset management…

The real cost of legacy data – Managing the ROT
As organizations are looking to modernize their technology estate, many remain burdened with legacy data, costing millions of dollars a year to host and maintain. The risks posed by legacy and redundant, obsolete and trivial (ROT) data present a very real threat in today’s progressive cybercrime landscape. In this post we’ll consider the hidden costs…

The strategic role of data discovery in digital transformation
Modern businesses are operating in a rapidly evolving digital world, and risk failure if they are unable to keep pace with their peers. The increasingly online nature of our personal and business lives is forcing organizations toward strategic digital transformation at break-neck speed. Whether it’s automating legacy systems, enhancing customer experience or reforming business processes…

Business resilience for the data age: Why data discovery is the cornerstone
As cyber-attacks continue to significantly impact business operations, whether targeting the organization or their supply chain, amid a turbulent geopolitical climate, it’s clear that business resilience is now a crucial necessity for organizations of all sizes. According to a 2023 report from PwC, 96% of organizations had experienced business disruption in the previous two years.…

Understanding Data Management, Data Governance and DSPM
Today, organizations are powered by the data they collect, store, analyze and process. Data drives company decision-making, enhanced operations and clearer understanding of customers, market trends and company performance. Consumers too are driving this increased reliance on data. Delivering seamless customer experiences across all interactions is fundamentally built on the development of unique customer profiles,…

Data Security Posture Management (DSPM) – What You Need to Know
Introducing Data Security Posture Management (DSPM) Modern businesses are generating, storing and processing more information across more diverse environments than ever before. This trend is set to continue as organizations embrace AI technologies and reject traditional on-premises operations for the agility and feature-rich offerings of cloud-based networks and SaaS platforms. However, this vast opportunity also…

World Password Day | Why secrets discovery is the first step to securing your organization
Have you ever counted how many times a day you access information by logging into a platform or system, or providing a password or keycode? In today’s digital world, passwords have become cemented in our personal and professional lives. The first Thursday of May is World Password Day, initiated in 2013 by Intel to raise…

Seven steps to effective data risk management
Data risk management is becoming increasingly important to businesses, as the vast amounts of data generated today present potential both for operational gain and organizational risk. Over the last decade, data has emerged as the lifeblood of innovation. Nevertheless, handling such vast quantities of data, much of which is personal or commercially sensitive, comes with…

DeepSeek, GenAI and data sovereignty: What privacy professionals need to know
When DeepSeek was released in January, it caused shockwaves in international stock markets and became the most downloaded app across Apple and Google app stores. The instant success of the application has sparked significant debate — not for its features or capabilities, but for the questions it raises about data sovereignty. This concern is not…

Building trust in digital transactions: Payment security in 2025
The payment landscape continues evolving rapidly, influenced by technological advancements and changing consumer behaviors. These changes present new threats to payments security and demand flexibility and innovation to ensure continued consumer trust. This article explores the key trends shaping payment security in 2025. From advanced threat intelligence and biometrics to AI-driven fraud detection and API…