Domain-based Message Authentication, Reporting, and Conformance (DMARC)

What is DMARC? Domain-based Message Authentication, Reporting, and Conformance, or DMARC, is a policy framework that allows email domain owners to protect their domain from unauthorized use. It builds on both SPF and DKIM to provide domain owners with better control over how their emails are authenticated and how to handle failed authentication attempts. DMARC […]

DomainKeys Identified Mail (DKIM)

What is DomainKeys Identified Mail (DKIM)? DomainKeys Identified Mail (DKIM) provides an additional layer of email security by enabling domain owners to attach a digital signature to their outgoing emails. This signature is generated using a private key associated with the sender’s domain and is included in the email’s header. The recipient email server can then […]

Discretionary Access Control (DAC)

What is Discretionary Access Control (DAC)? Discretionary Access Control (DAC) is a system for managing access to data or resources where the decision to grant or restrict access is determined by the resource owner. In this model, individuals with the appropriate permissions can assign access rights to others, giving them the flexibility to decide who […]

Data Catalog

Data Catalog A data catalog is a structured inventory of an organization’s data assets, designed to help users locate, understand, and access the information they need. It functions like an organized directory, where each data asset—such as databases, files, or reports—is described with key details, including its origin, structure, meaning, and any associated rules or […]

Differential Privacy

Differential Privacy Differential privacy is a technique used to ensure that the release of data or the results of data analysis does not compromise the privacy of individuals within the dataset. It works by adding controlled random noise to the data or query results, making it difficult to trace any specific information back to an […]

Data Redaction

Data Redaction Data redaction is the process of selectively removing or obscuring sensitive information from a document or dataset before it is shared or made accessible. The goal is to protect confidential or personally identifiable information (PII) while allowing the remaining data to be viewed or used. Data redaction is commonly applied to documents, images, […]

Data Activity Monitoring (DAM)

Data Activity Monitoring (DAM) Data activity monitoring (DAM) is a security process that involves continuous tracking and analyzing access to and usage of data within databases or other storage systems. The primary goal of DAM is to detect and respond to unauthorized or suspicious activities in real-time, ensuring that sensitive information is accessed only by those […]

Dynamic Data Masking (DDM)

What is Dynamic Data Masking (DDM)? Dynamic data masking (DDM) is a security feature that helps protect sensitive information by dynamically altering the data’s appearance when accessed by certain users or roles. Instead of changing the actual data in the files, DDM applies masking rules at the time of query execution, so the user sees […]

Document Security

Document Security Document security refers to the practices and technologies used to protect documents from unauthorized access, alteration, theft, or destruction. It involves ensuring that sensitive or confidential information within documents is safeguarded throughout its lifecycle, from creation and storage to sharing and eventual disposal. This can include implementing access controls, encryption, digital rights management, […]

Dark Data Management

Dark Data Management Dark data management refers to the process of identifying, organizing, securing, and analyzing the dark data – the vast amount of data within an organization that is collected but not actively used. This practice involves uncovering hidden or overlooked data, often stored in various formats and locations, and turning it into a […]

Dark Data

Dark Data Dark data refers to the vast amount of information that organizations collect, process, and store but do not actively use or analyze. This data is often hidden within databases, logs, emails, archives, and other digital storage systems. While it has the potential to provide valuable insights, dark data remains untapped, largely because organizations either […]

Data Security Pillar

Data Security Pillar The data security pillar refers to the foundational elements and practices that an organization implements to protect its data from unauthorized access, breaches, and other cyber threats. It encompasses a wide range of strategies, technologies, and policies designed to ensure the confidentiality, integrity, and availability of data throughout its lifecycle, from creation […]

iSMG Data Security Summit: Dallas

May 15, 2025
Renaissance Dallas at Plano Legacy West Hotel

Join us at our session to learn more about data security, privacy, and governance in the age of LLMs.

Keep me informed