Reading Time: 4 minutes Data loss is a constant threat to businesses, and the risk it comes with is not just a monetary one from breaching regulatory requirements, but perhaps far more costly in the long run is the potential reputational damage. When… Read More

Reading Time: 5 minutes Cloud-based work environments are both convenient and cost-effective, especially in today’s remote world, but can present a challenge when it comes to meeting both regulatory compliance requirements and ensuring the protection of sensitive data. In order to maintain the… Read More

Reading Time: 2 minutes In my last blog on information-centric security, I talked about the need for data to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well… Read More

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

Reading Time: 2 minutes The term “classification” has been thrown around progressively by software companies that offer related products like data governance and DLP. In some cases, the vendor will define “classification” as the ability to discover and protect data, which is a… Read More