BLOG
Efficient, secure, scalable
scanning of cloud data stores
Organizations typically make use of a variety of data stores, each tailored to specific applications and use cases.
AUTHOR
Director of Product Management
Browse by type:
Training Your LLM Dragons: Why DSPM is the Key to AI Security
AI’s transformative potential comes with a price—its complexity and reliance on sensitive data make it a prime target for security threats. For most organizations, the two primary use cases, custom large language models (LLMs) and tools like Microsoft Copilot, introduce unique challenges. Custom LLMs often require extensive training on organizational data, creating risks of embedding […]
Cybersecurity Awareness: 31 Essential Data Security Tips
Thirty-one practical data security tips, organized by category, help your team safeguard sensitive data and reduce risks.
Empowering Snowflake Users Securely
Two security leaders address data sprawl, user access governance, compliance, and scaling security within their Snowflake environments.
Improving Accuracy: A Smarter Approach to Data Classification
Normalyze maximizes data classification accuracy and performance while reducing cost, using a mix of traditional methods and LLMs.
9 Tips to Simplify and Improve Unstructured Data Security
Unstructured data has long been a challenge to control—but not anymore. These 9 tips can simplify and improve your unstructured data security.
Scaling Data Security Efficiently: A CISO’s Perspective on DSPM
Former CISO of global brands Renee Guttmann shares insights on efficient security teams, data storage costs, access controls, and data security risks.
Data Handling for DSPM: Balancing Speed and Security
It’s important to consider how DSPM vendors handle data. Explore three distinct approaches with very different characteristics.
AI and Data Protection: Strategies for LLM Compliance and Risk Mitigation
AI brings a host of data security concerns that can impact compliance. Here’s how you can keep your sensitive data secure in the age of AI.
Efficient, Secure, Scalable Scanning of Cloud Data Stores
Securing critical data in cloud databases, volumes attached to virtual machines, and data stores protected by virtual private clouds.
7 Ways Data Access Governance Increases Data ROI
Data Access Governance increases the value (ROI) of data to the organization while reducing costs and risk.
A Step-by-Step Guide to Improving Large Language Model Security
How should we think about securing AI? What are the data security implications? Learn how to keep your data protected.
Understanding and Tackling Abandoned Data
Abandoned data not only increases the risk of breaches and compliance issues, it also drives up storage costs. That’s why it needs to be on the security team’s radar.
8 Ways to Reduce Data Storage Costs
For many organizations, data storage costs have become astronomical–and they continue to grow every month. Here are 8 steps to reduce your costs.
GigaOm Insights for Improving Data Security
Insights into how an understanding of your data, regardless of where it resides, is the foundation of any effective data security program.
How to Calculate Security Posture
Six clear steps that provide a methodology for understanding and measuring your organization’s data security posture.
Best Practices to Avoid a SaaS Data Compromise
Following these best practices to minimize the risk of a SaaS data compromise.
Eliminate Security Blindspots in Your Snowflake Data
Many Normalyze customers use Snowflake, so it’s useful to describe how our solution helps Snowflake users eliminate security blindspots.
An Essential Guide to Data Security Posture Management (DSPM) Solutions
Get general tips on FAQs like: “How do I get started with DSPM?”, “What are its key components?”, and “What are some common mistakes people make with DSPM?”