One of the big challenges with implementing narrow point products for enterprise data security is that the IT ecosystem in which your data resides is...
Nov 23, 2021 l Data Protection, Data Discovery & Classification
A Few Points About Point Products for Protecting Private Data
You don’t have to go out of your way these days to learn about ongoing data breaches. You don’t have to pore over the online tech news sites with...
So here’s a philosophical question: is it better to try to prevent something unfortunate from happening, even if the prevention success rate is much...
Oct 28, 2021 l Data Protection, Zero Trust
4 Myths About Data-centric Security on the Journey to Zero Trust
If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started...
Oct 19, 2021 l Data Protection, Zero Trust
Starting with Data-centric Security: a Cost-Benefit Analysis
If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find...
Oct 12, 2021 l Data Protection, Zero Trust
Applying Data-centric Security Early in your Zero Trust Initiative
My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the...
Oct 5, 2021 l Data Protection, Zero Trust
Data is the Prize - The Pillars of Zero Trust from Another Perspective
In fascinating 2018 testimony before a US congressional subcommittee on terrorism and illicit finance, Lillian Ablon provides insights into what...
Sep 28, 2021 l Data Protection, Zero Trust
Zero Trust Series Part 1: Why Data Protection is the Keystone for ZT
Zero Trust has a nice ring to it, in a firm and sort of non-compromising way. Not only does it sound serious, it sounds pretty final too. I mean, if...
Sep 23, 2021 l Data Protection, Cloud Computing
The Big Question: How To Protect Your Data In The Cloud
You might not think it's possible to protect your data in the cloud, given the increasing number of cloud-based incidents occurring in the world and...