Whitepaper: How Businesses Can Meet CCPA Compliance Requirements

The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights. The state government passed CCPA in June 2018 and began enforcing it on July 1, 2020. Although several high-profile companies have already made headlines for violating this law, and California has been imposing fines, many companies are […]

Whitepaper: Ransomware Protection with Pure Storage and Commvault

Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason. They compromise access to your organization’s lifeblood—data. Consequences can be dire: Pay perpetrators to (maybe) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions of dollars spent annually to guard entry points […]

Whitepaper: Discovery-In-Depth, The Path to Data Intelligence

Privacy-centric data discovery (a must for data privacy and cybersecurity in today’s environment) requires a multi-pronged strategy to identify all types of sensitive & personal data in an organization – and that strategy starts with discovery-in-depth. Data discovery is a foundational element of any type of data management: from cybersecurity to data privacy to data […]

eBook: The Six Foundations of Data Privacy Regulation

The six most commonly discussed data protection regulations are the European Union’s GDPR, the California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) in the United States, Brazil’s LGPD, Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) and the Australian Data Privacy Law. These regulations establish the who-what-when-where-how and why […]

eBook: The Habits of Highly Data-Secure Companies

New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud. Today’s businesses grapple with securing digital assets scattered across a variety of IT environments. These hybrid infrastructures might comprise a mix of traditional data centers, public cloud services, and on- and off-premises private clouds. […]

eBook: The State of Email Security 2020

Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity. Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised accounts, vulnerable insiders, social engineering), or beyond the organization’s […]

Whitepaper: The Practical Executive’s Guide To Data Loss Prevention

There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. There are numerous contributing factors, most notably a general lack of understanding in the vendor community about how data security works or what communicates risk to a business. Impractical processes were established, operational bottlenecks ensued, and the ongoing threat of data […]

Data protection is everyone’s job so it’s no one’s job

Ask a company which role or team is ultimately responsible for ensuring data protection or data security, and they often cannot give a single, clear answer. Data protection is inherently a cross-functional problem, but different parts of the organisation are focused on different priorities, and rightly so. Data security and governance too often fall between […]