data security
Data fuels business success. Poor data security can spell business failure. Read our insights on data security trends, best practices, and more.
Insights
Blog
Practice Empathy To Reduce Insider Risk
Companies announcing layoffs need to pay attention to insider risk. Showing compassion and communicating openly can help.
Blog
Our 2022 Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse
The Coppola classic has a few surprising parallels with today's chief information security officer.
Is Your Data Ready For AI?
Learn the 8 phases of shifting to an AI-first data strategy.
Blog
Handling International Data Transfers Is Nothing New — Someone Tell Meta!
If, in the world of privacy, I had to pick one topic that never goes out of fashion, it would be managing international transfers of EU personal data. Since the introduction of the EU Data Protection Directive in 1995 and continuing with the EU General Data Protection Regulation (GDPR), companies engaging in the storage and/or […]
Blog
Navigate China’s New Data And AI Regulations
Firms often struggle to identify the appropriate security controls and practices to comply with fast-changing data regulations. Here are three practices firms should adapt to keep pace.
Blog
Forcepoint Acquires Bitglass
In its quest to add to its Zero Trust edge (ZTE), also known as secure access service edge (SASE), portfolio, Forcepoint acquired cloud security gateway (CSG), also known as cloud access security broker (CASB), provider Bitglass for a Forrester-estimated $200-300 million last week. Beyond the usual criteria (ability to retain marketing and development talent of Bitglass), […]
Podcast
The Risks And Rewards Of Biometric Data
Biometric data use is at a crossroads. Consumers love the convenience it provides but have privacy concerns. In this episode, VP, Research Director Merritt Maxim and VP, Principal Analyst Andras Cser dive into the benefits and risks of biometric data.
Blog
Prepare Now For Data Deprecation’s Impact On B2B Advertising
Even with Google's recently announced cookie deprecation delay, B2B advertisers need to move quickly to ensure their continued success.
Podcast
The Rising Cost Of Ransomware
What’s driving the increase in ransomware attacks, and what can security leaders do to protect their organizations? Analysts Allie Mellen and Steve Turner provide insight in this episode.
Blog
Zero Trust For Healthcare Orgs Is Just What The Doctor Ordered
Healthcare data is low-hanging fruit for hackers. Learn how adopting a Zero Trust strategy can help keep your data safe.
Blog
Invest Now: Your Interoperability Strategy Will Drive Patient Outcomes
“The first wealth is health.” — Ralph Waldo Emerson These words of perennial wisdom are a compelling reminder that public health is the bedrock for constructing a prosperous economy and nation. This very philosophy beckoned me to the healthcare field as a student and public health professional for the past two decades. My name is […]
Blog
The Death And Life Of The Stand-Alone Solution
While automated malware analysis and network intrusion detection systems remained in our Divest category, three more technologies joined them this year: data loss prevention, managed security service providers, and security user behavior analytics. Why is this? Because these stand-alone technologies simply don’t cut it anymore. This isn’t to say these solutions are dead, mind you. No, they live on in within larger, more comprehensive solutions.
The New, Unstable Normal
Learn how COVID-19 will change business and technology forever in this webinar
Blog
Navigating The Struggles Of Data Deletion And Secure Data Disposal
How long does your organization retain customer, employee, and sensitive corporate data, and how do you go about disposing of it? In the absence of explicit regulatory mandates, when and how to delete different types of records and personal data can become a tug-of-war between line-of-business, legal, and security teams. There are consequences of improper deletion and disposal, as well as excessive retention. In Italy, telecommunications company TIM received a fine […]
Blog
Reflections On 2020: Cybersecurity Predictions Versus Reality
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]
Blog
Privacy And Security: We Need Both For Communications, And There’s An App For That
Is WhatsApp safe for business use? Principal Analyst Heidi Shey provides insight for CISOs.
Blog
On International Data Privacy Day, Celebrate Your Employees’ Privacy
In their haste to manage the pandemic's impact, many employers deprioritized their data protection responsibilities. Now is the time to renew the focus on employee privacy and confidentiality.
Blog
AI Drives The Evolution Of Technology And Data Governance
Learn why data and tech governance initiatives must evolve to embrace ethics and risk this year.
Blog
Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience
In 2021, culture issues, budgets, and vendor shifts will be top priorities for cybersecurity leaders. Learn more in our 2021 cybersecurity predictions.
Blog
It’s Time To Say Goodbye To The EU-US Privacy Shield
In the wake of the recent ECJ ruling on Safe Harbor, here are five steps security and risk professionals can take to ensure the safe transfer of personal data of European residents to the US.
More posts