Subscribe

Dec 16, 2021 l Data Protection

The Many Roads to Data Protection

Getting from point A to point B in a car always seems to be a pretty easy proposition, at least until you’re behind the wheel and moving. On a map,...

read more

Dec 9, 2021 l Data Protection, Data Breaches

The Value of Annual Industry Predictions

The other day, my colleague Brett Bicker, who heads up comforte’s enterprise market development team, and I were on a Zoom call ready to record our...

read more

Dec 2, 2021 l Data Protection, Compliance

The Ethical Side of Data Privacy Compliance

None of us likes to be told what to do. Especially when what we’re being told (or ordered) to do is tedious, expensive, unexciting, or counter to...

read more

Nov 23, 2021 l Data Protection, Data Discovery & Classification

A Few Points About Point Products for Protecting Private Data

One of the big challenges with implementing narrow point products for enterprise data security is that the IT ecosystem in which your data resides is...

read more

Nov 18, 2021 l Data Protection, Data Breaches

What We Can Learn from Data Breaches

You don’t have to go out of your way these days to learn about ongoing data breaches. You don’t have to pore over the online tech news sites with...

read more

Nov 4, 2021 l Data Protection

Breach Prevention or Breach Mitigation? Choose Wisely!

So here’s a philosophical question: is it better to try to prevent something unfortunate from happening, even if the prevention success rate is much...

read more

Oct 28, 2021 l Data Protection, Zero Trust

4 Myths About Data-centric Security on the Journey to Zero Trust

If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started...

read more

Oct 19, 2021 l Data Protection, Zero Trust

Starting with Data-centric Security: a Cost-Benefit Analysis

If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find...

read more

Oct 12, 2021 l Data Protection, Zero Trust

Applying Data-centric Security Early in your Zero Trust Initiative

My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the...

read more
14 15 16 17 18