Live Webinar: Overcoming Unstructured Data Security and Privacy Choke Points

David Kwag

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as …

Ok, the results are in!

Deborah Kish Data breach, Data security, Privacy Leave a Comment

Thanks to all of you who responded to my last blog post regarding unstructured data security and privacy topics you’d like to hear more about. Here’s a sampling: Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? …

What’s Next from Deborah’s Desk

Deborah Kish Cybersecurity, Data security, Insider threat, Print security, Privacy Leave a Comment

So, in my last post, I mentioned a series of webinars and thought this would be a good opportunity to provide a little preview into some of the topics we’re planning on discussing. Unstructured data, of course!  But what about it?  I’ll be discussing the challenges… kind of a “What I heard from you as a Gartner data security analyst” …

What’s New at Fasoo?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Privacy Leave a Comment

Me! After over 20 years with leading IT consultancy, Gartner, I am excited to announce that I have recently joined data security vendor Fasoo. At Gartner, my focus on enterprise data security and compliance challenges, products and technologies led me to really understand the significance of the “Wild Wild West” nature of unstructured data. On average, I advised 30 CISOs …

Don’t Complicate Data Discovery and Classification

Ron Arden Data breach, Data security, Privacy

Data discovery and classification is an important first step to protect your confidential data and comply with privacy regulations.  You need to identify the location of your data and its value to your organization before determining how to protect it.  Done right, this leads to a data-centric security and compliance program that is critical to your corporate brand and competitive …

Think of a Layered Data Security Framework

Ron Arden Data breach, Data security, Secure collaboration Leave a Comment

The barrage of data breach news on the front page should come as little surprise to any of us. The more data stored and sent digitally, the more we expose ourselves and more breaches occur.  With all the resources and money spent on preventing a breach, we might think it is reasonable to expect that the number of reported incidents …

A Data-Centric Security Framework for a Perimeter-less World

Ron Arden Cybersecurity, Data breach, Data security Leave a Comment

The internet, its commercialization and all its technological advances have changed the way of the modern world. Unlimited information is available at the touch of a button; tasks that used to take time and effort are now much simpler.  All this technology created the opportunity for companies to find new and creative ways to grow revenues and data collection has …