May 12, 2022 l Data Protection, Data Breaches

Why Data Protection is the First Step to Mitigating Insider Risk

Much is written about the corporate threat from shadowy remote hackers. A cybercrime economy worth trillions has certainly made this disparate bunch of financially motivated threat actors a major force to be reckoned with. But the biggest risk to corporate data and cybersecurity may in fact be closer to home.

Read more

Oct 28, 2021 l Data Protection, Zero Trust

4 Myths About Data-centric Security on the Journey to Zero Trust

If you’ve been tracking along with this entire blog series, you know that I’ve covered a lot of ground both technical- and business-wise. I started...

read more

Oct 19, 2021 l Data Protection, Zero Trust

Starting with Data-centric Security: a Cost-Benefit Analysis

If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find...

read more

Oct 12, 2021 l Data Protection, Zero Trust

Applying Data-centric Security Early in your Zero Trust Initiative

My previous post in this series ended with a pretty definite statement: if data is all-important to hackers and other threat actors and is the...

read more

Oct 5, 2021 l Data Protection, Zero Trust

Data is the Prize - The Pillars of Zero Trust from Another Perspective

In fascinating 2018 testimony before a US congressional subcommittee on terrorism and illicit finance, Lillian Ablon provides insights into what...

read more

Sep 28, 2021 l Data Protection, Zero Trust

Zero Trust Series Part 1: Why Data Protection is the Keystone for ZT

Zero Trust has a nice ring to it, in a firm and sort of non-compromising way. Not only does it sound serious, it sounds pretty final too. I mean, if...

read more
1