Insider Threat Protection: Strategies and Solutions to Defend Your Organization

Navigating PCI DSS 4.0 Compliance: Mastering the New Standards with DSPM

Protecting Sensitive Data in Big Data Environments

Security Controls and Automation: Protecting Sensitive Data in the Cloud

Pay as You Grow: A Modern Way to Buy and Use Data Security

AI Data Security: The Integrated Power of Databricks' DASF and DSPM

Healthcare Data Security: Protecting Patient Privacy

Data Protection for Remote Workers

Managing Risk Across Your Data Lifecycle with 'Pay as You Grow' Flexibility

Data Security in Cloud Migration: What You Need to Know

DSPM in Third-Party Integrations and Supply Chain

Data Warehouse Compliance Checklist

Optimizing Data Security Posture in Remote Work Environments

A Practical Guide to Advanced Data Classification Strategies

Your Guide to Protecting Sensitive AI Training Data

Protecting PII Data in AI Applications

The Future of Data Security and GRC

Questions on Data Security & Governance

Securing Against Insider Threats: A DSPM Strategy

Navigating HIPAA Regulation 164.308: Administrative Safeguards for Healthcare Practices

Strengthening Third-Party Data Collaborations in AI-Driven Enterprises

Beyond Data Privacy Day: Embracing Continuous Data Protection

Enhancing Data Security and Governance with Automated Controls

Shifting to DevSecOps: Enhancing Security with DSPM

A Strategic Approach to Mitigating Insider Threats

Driving Data Security and Governance in a Multi-Cloud Environment

Securing and Governing Training Data for Enterprise AI Applications

Your Guide to Securing the Data Lifecycle

Making Sense of Data Governance

The Complexities of Data Security: Insights from Top CISOs

A Deeper Dive into Dasera's Approach to Data Security

Dasera - 8 Essential Tips for Strengthening Your Organization's Data Security Posture with Dasera

Dasera's Guide to Mastering ISO/IEC 27001 Certification

Securing M&A Success: Mastering Data Security with DSPM

Securing Patient Data in Healthcare: The Power of DSPM with Dasera

Navigating Data Security in the AI-Driven Age

Securing Your Finances Online: Understanding the Impact of FTC's New Rules and the Advent of Open Banking

How Fintech is Forging New Paths in Data Security with DSPM

Dasera's Recognition in Gartner's 2023 Market Guide for Insider Threats

Strengthening Data Security: The Guide to DSPM with Dasera

The Double-Edged Promise of Biden's AI Executive Order

A Guide to Proactive Data Security with Advanced Posture Management

Comprehensive FAQs on Dasera's Data Security Platform: Your Ultimate Guide

Leveraging Data Security Posture Management to Defend Against Cyber Risk

Redefining Financial Data Protection with DSPM Solutions

Integrating DSPM in DevSecOps for Enhanced Data Security and Governance

Guarding the Goldmine: Structured Data Protection to ‘Secure the World’ this Cybersecurity Month

Strengthening Data Security in Healthcare with DSPM

Streamlining Data Security for E-commerce with DSPM

April Slayden- 2023 SC Media Women in IT Security honorees

Securing Mixed Data Environments with Data Security Posture Management

Achieving Data Compliance in the Age of Data Privacy Regulations through DSPM

Enhancing DSPM: Beyond Traditional Limitations

Dasera Wins Platinum Data Governance Award at Security Today's 2023 New Product of the Year

The Benefits and Application of DSPM

Understanding DSPM and Its Role in Modern Data Security

Enhancing Cloud Security with DSPM for a Resilient Data Infrastructure

Embrace DevSecOps with Data Security Posture Management for Comprehensive Protection

Enhancing Data Security in Cloud Environments: Best Practices and Automation Benefits

Navigating the New Era of Data Security with Dasera: Pioneering Data-in-Use Monitoring and Query Analysis

Achieve Regulatory Compliance in Data Warehouses and Data Lakes with Dasera

Emerging Data Security Trends and Challenges

The True Cost of Data Breaches: Why Companies Must Partner with Security Providers

Mastering the Shared Responsibility Model: Secure Cloud Data Lakes & Data Warehouses

Enabling Data Access Governance in Data Lakes

Mastering the Puzzle of Governance and Security

Protecting Your Data: The Three-Pillar Approach to Cyber Security

Safeguarding Sensitive Data in the Digital Age

Our Guide to Securing Data Lakes and Data Warehouses

Decoding Data Breaches: An Analysis of Verizon's 2023 Report

Dasera Wins Products that Count Award

2023 Women in Security Forum Power 100 Winner

Celebrating Success: Dasera Wins Gold Globee Award for Data Governance

Operationalizing Data Security

Crossing the Chasm to Data Security Automation

Level-up Your Company’s Security Awareness

Data De-identification and HIPAA

The Wind Cave Release

Announcing Our Crater Lake Release

DataGovOps: Fixing the Broken Promise of Data Governance

Dasera Selected as Finalist for SC Awards

Data Governance: It Takes a Village (and Good Infrastructure)

Dasera a Most Innovative Startup Finalist at RSAC 2022

We're a 2022 SIIA CODiE Award Finalist for Best Emerging Technology

Announcing Dasera's Mt. Rainier 4.0 Release

Dasera Wins Three 2022 Cyber Security Global Excellence Awards

Dasera Named Gold Winner for 2022 Cybersecurity Excellence Awards for Cloud Data Security

Dasera Achieves SOC 2 Type 2 Compliance for Its Data Security Platform Offering

Decentralize Your Cloud Data Security

Mitigating the Risk of Data in the Cloud

How to Prevent the Common HIPAA Violations in the Cloud

The CISO Perspective on Cloud Data Security

Marathon, Not Sprint: Zero-Day Exploit Targeting Popular Java Library Log4j

2022 Data Breach Industry Forecast Report: What This Means For Businesses

A Hacker’s Sweet Spot: Love on Dating Platforms

Curiosity Killed the Cat: Amazon Employees Found Snooping on Celebrity Data

Prevent Your Data From Going Rogue: Cloud Data Security Challenges & Customer Use Cases

How TikTok’s $92 Million Settlement Shows Data Privacy and Personalization at Odds

Data Lakehouses: How Secure is the Best of Both Worlds?

Interview with Selim Aissi, CISO & Data Security Advisory Board Member

CISO Anshu Gupta Presents on Security Best Practices

Gaming Streaming Platform Twitch Hacked by Malicious Attacker

Data Classification: How to Classify Your Company's Data and Be Better Prepared for a Data-driven Future

Telegraph Data Leak Exposes 10 TB of Sensitive Subscriber Data

[Cloud Security Podcast] Data Stores and Security are Two Silos in the Cloud

Cloud data protection isn't working for most companies. Here's how to fix it.

[SANS Webinar] What’s the Riskiest Place on Earth? Your cloud data stores.

Database Security: The Fundamentals and the Future of Database Security in the Cloud

Dasera Wins Data Security Innovation of the Year in 2021 Cybersecurity Breakthrough Awards

Watch Your Steps – 61 Million Records Exposed Including Geo Locations of Apple and FitBit Users

Healthcare Apps Subject to Data Breach Notification Rule After FTC Policy Change

When Travel Goes Wrong: 106 Million Visitors to Thailand Impacted by Data Breach

The State of Data Security: The Cost of Digitization and Cloud Adoption

OWASP Announces Top 10 Web Application Security Threats for 2021

8 Data Compliance Considerations You Can't Afford to Overlook

Data Security: How to Protect Your Data From Data Breaches

Dasera: Culture That Matters

ChaosDB: A CISO’s Worst Nightmare Come To Life

Data Leak Exposes 38 Million Records From Misconfigured Access Control Setting of Microsoft Power Apps

Chase Bank Joins the Growing List of Institutions Affected by Data Leaks

Video Interview: How Dasera is Disrupting Data Security with Its Comprehensive Approach

Diversity, Equity and Inclusion – Key to Bolstering Business Success in Cybersecurity

Illinois Health Department Data Breach Exposes COVID-19 Vaccination Records

Announcing Dasera’s Sequoia 3.0 Release

Dasera Named Finalist for Baby Black Unicorn Awards at Black Hat 2021

Insurance Tech Startup Exposes Thousands of Insurance Applications

Taking the Leap  — Joining Dasera as Head of Product

Survey Reveals 39% of IT Leaders Are Not Confident Their Data is Secure

Dasera Wins CRN’s 2021 Emerging Vendors Award [Security Category]

Mint Mobile Hit by a Data Breach: Numbers Ported, Data Accessed

The Journey Begins — Joining Dasera as VP of Marketing

Dasera Strengthens Executive Ranks with Three Top Women Leaders

Mercedes-Benz USA Exposes Personal Data of 1.6 Million Customers

Sensitive Data Leak of Billionaire IRS Tax Returns Spurns Outcry

Dasera Named Among Top 10 Hottest Cloud Security Startup by CRN

Dasera Named Startup of the Year For Security Software for 2021 IT World Awards

Data Security Lapse Exposes 3.3 million Customer Records from Volkswagen

Dasera Wins 2021 Global InfoSec Award from Cyber Defense Magazine

Why We're Excited About our New Financing Round

Get to Know Our New VP of Sales

Implications of the Microsoft Exchange Server Cyber Attack

The Journey of Bringing Data Lifecycle Security to Market

Securing the Data Lifecycle Key to Data Security and Compliance

Dasera Named SC Awards Finalist for Best Database Security Solution

The Equifax Data Breach: A Deep Dive Infographic

[Press Release] Dasera Releases Data Lifecycle Trust and Privacy Report on Data Privacy Day

Dasera Infographic: Protecting Student Data

[Press Release] Dasera’s Latest Release Secures the Entire Data Lifecycle for Cloud Data Stores

All That's Included in Dasera's Latest Yellowstone Release: Data Classification, Tagging, Policy Editor, Coaching and More

Inside Scoop of a Hospital Data Breach

10 Inspiring Women Leaders in Cybersecurity to Follow Today

Five Cloud Data Threat Scenarios Only Query Analysis Can Protect You From

Zero Trust or Insights-Based Trust: How can CISOs Enable Internal Data & Analytics Adoption

Book Launch: The Red Book of Insider Threats

The Limitations of Training and Trust: What We can Learn About Insider Threats from the Coronavirus Pandemic

[Webinar Summary] SINET Live with UK CEOs - Building Strength On Strength

20 Must-Read Insider Threat Blogs for 2020

Cybersecurity Mashup (Spring 2020): Insider Threats, Data Breaches, and of course COVID

A Brief History of the Data Warehouse

'Inside Scoop' Infographic: Three Unique Insider Breaches Explained

Queries: the Ground Truth for Cloud Data Security

Why you (and everyone you know) have a blind spot for insider threats

Working Completely Remotely? 7 Things We Did That You Can Adopt Easily

How I'm Staying Positive in a Global Pandemic

Why we started Dasera?

Dasera Presents on Insider Threats at RSA Conference 2020 LaunchPad