Many organizations don’t store their data. They hoard data. Too often, organizational data accumulates in a never-ending cycle of unnecessary duplication and hoarding. As a result, they suffer ever-growing data storage fees and significant risks to data security and...
I’m excited to share a recent conversation I had with GigaOm analyst Paul Stringfellow about how DSPM and a data-centric approach are essential to data security. Paul and I discussed our perspectives on the challenges businesses face – which are significant – as...
The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different types of attacks. In late February, a ransomware gang known as Black Cat claimed responsibility for hacking Change...
To many, data security posture can seem like an abstruse concept that’s difficult to understand, much less quantify. But by developing a clear methodology and breaking the process down into measurable steps, data security teams can provide clarity into their...