I’m excited to share a recent conversation I had with GigaOm analyst Paul Stringfellow about how DSPM and a data-centric approach are essential to data security. Paul and I discussed our perspectives on the challenges businesses face – which are significant – as...
The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different types of attacks. In late February, a ransomware gang known as Black Cat claimed responsibility for hacking Change...
To many, data security posture can seem like an abstruse concept that’s difficult to understand, much less quantify. But by developing a clear methodology and breaking the process down into measurable steps, data security teams can provide clarity into their...
The reality is that, while SaaS application vendors build in a fair amount of security in their solutions, a few things can get in the way: Humans: Decisions we defer and mistakes we make all add up to vulnerabilities. Manual processes: Related to the first, there...