Zero Trust as the Key to Data Security

By: David Mundy May 23, 2024

Managing Data Security in a Decentralized Workforce

By: David Mundy May 14, 2024

Insider Threat Protection: Strategies and Solutions to Defend Your Organization

By: David Mundy May 6, 2024

Navigating PCI DSS 4.0 Compliance: Mastering the New Standards with DSPM

By: David Mundy May 3, 2024

Protecting Sensitive Data in Big Data Environments

By: David Mundy April 30, 2024

Security Controls and Automation: Protecting Sensitive Data in the Cloud

By: David Mundy April 18, 2024

Pay as You Grow: A Modern Way to Buy and Use Data Security

By: David Mundy April 17, 2024

AI Data Security: The Integrated Power of Databricks' DASF and DSPM

By: David Mundy April 16, 2024

Healthcare Data Security: Protecting Patient Privacy

By: David Mundy April 12, 2024

Data Protection for Remote Workers

By: David Mundy April 4, 2024

Managing Risk Across Your Data Lifecycle with 'Pay as You Grow' Flexibility

By: David Mundy April 1, 2024

Data Security in Cloud Migration: What You Need to Know

By: David Mundy March 28, 2024

DSPM in Third-Party Integrations and Supply Chain

By: David Mundy March 22, 2024

Data Warehouse Compliance Checklist

By: David Mundy March 20, 2024

Optimizing Data Security Posture in Remote Work Environments

By: David Mundy March 12, 2024

A Practical Guide to Advanced Data Classification Strategies

By: David Mundy March 8, 2024

Your Guide to Protecting Sensitive AI Training Data

By: David Mundy March 1, 2024

Protecting PII Data in AI Applications

By: David Mundy February 26, 2024

The Future of Data Security and GRC

By: David Mundy February 22, 2024

Questions on Data Security & Governance

By: David Mundy February 20, 2024

Securing Against Insider Threats: A DSPM Strategy

By: David Mundy February 16, 2024

Navigating HIPAA Regulation 164.308: Administrative Safeguards for Healthcare Practices

By: David Mundy February 7, 2024

Strengthening Third-Party Data Collaborations in AI-Driven Enterprises

By: David Mundy February 1, 2024

Beyond Data Privacy Day: Embracing Continuous Data Protection

By: David Mundy January 30, 2024

Enhancing Data Security and Governance with Automated Controls

By: David Mundy January 25, 2024

Shifting to DevSecOps: Enhancing Security with DSPM

By: David Mundy January 19, 2024

A Strategic Approach to Mitigating Insider Threats

By: David Mundy January 17, 2024

Driving Data Security and Governance in a Multi-Cloud Environment

By: David Mundy January 15, 2024

Securing and Governing Training Data for Enterprise AI Applications

By: David Mundy January 4, 2024

Your Guide to Securing the Data Lifecycle

By: David Mundy December 27, 2023

Making Sense of Data Governance

By: David Mundy December 22, 2023

The Complexities of Data Security: Insights from Top CISOs

By: David Mundy December 19, 2023

A Deeper Dive into Dasera's Approach to Data Security

By: David Mundy December 7, 2023

Dasera - 8 Essential Tips for Strengthening Your Organization's Data Security Posture with Dasera

By: David Mundy December 1, 2023

Dasera's Guide to Mastering ISO/IEC 27001 Certification

By: David Mundy November 30, 2023

Securing M&A Success: Mastering Data Security with DSPM

By: David Mundy November 29, 2023

Securing Patient Data in Healthcare: The Power of DSPM with Dasera

By: David Mundy November 27, 2023

Navigating Data Security in the AI-Driven Age

By: David Mundy November 22, 2023

Securing Your Finances Online: Understanding the Impact of FTC's New Rules and the Advent of Open Banking

By: David Mundy November 20, 2023

How Fintech is Forging New Paths in Data Security with DSPM

By: David Mundy November 16, 2023

Dasera's Recognition in Gartner's 2023 Market Guide for Insider Threats

By: David Mundy November 14, 2023

Strengthening Data Security: The Guide to DSPM with Dasera

By: David Mundy November 7, 2023

The Double-Edged Promise of Biden's AI Executive Order

By: David Mundy November 3, 2023

A Guide to Proactive Data Security with Advanced Posture Management

By: David Mundy October 30, 2023

Comprehensive FAQs on Dasera's Data Security Platform: Your Ultimate Guide

By: David Mundy October 25, 2023

Leveraging Data Security Posture Management to Defend Against Cyber Risk

By: David Mundy October 16, 2023

Redefining Financial Data Protection with DSPM Solutions

By: David Mundy October 11, 2023

Integrating DSPM in DevSecOps for Enhanced Data Security and Governance

By: David Mundy October 5, 2023

Guarding the Goldmine: Structured Data Protection to ‘Secure the World’ this Cybersecurity Month

By: David Mundy October 2, 2023

Strengthening Data Security in Healthcare with DSPM

By: David Mundy September 28, 2023

Streamlining Data Security for E-commerce with DSPM

By: David Mundy September 26, 2023

April Slayden- 2023 SC Media Women in IT Security honorees

By: David Mundy September 22, 2023

Securing Mixed Data Environments with Data Security Posture Management

By: David Mundy September 21, 2023

Achieving Data Compliance in the Age of Data Privacy Regulations through DSPM

By: David Mundy September 18, 2023

Enhancing DSPM: Beyond Traditional Limitations

By: David Mundy September 11, 2023

Dasera Wins Platinum Data Governance Award at Security Today's 2023 New Product of the Year

By: David Mundy September 8, 2023

The Benefits and Application of DSPM

By: David Mundy September 7, 2023

Understanding DSPM and Its Role in Modern Data Security

By: David Mundy September 5, 2023

Embrace DevSecOps with Data Security Posture Management for Comprehensive Protection

By: David Mundy August 16, 2023

Enhancing Data Security in Cloud Environments: Best Practices and Automation Benefits

By: David Mundy August 16, 2023

Navigating the New Era of Data Security with Dasera: Pioneering Data-in-Use Monitoring and Query Analysis

By: David Mundy August 9, 2023

Emerging Data Security Trends and Challenges

By: David Mundy July 27, 2023

The True Cost of Data Breaches: Why Companies Must Partner with Security Providers

By: David Mundy July 26, 2023

Mastering the Shared Responsibility Model: Secure Cloud Data Lakes & Data Warehouses

By: David Mundy July 21, 2023

Enabling Data Access Governance in Data Lakes

By: David Mundy July 21, 2023

Mastering the Puzzle of Governance and Security

By: David Mundy July 7, 2023

Protecting Your Data: The Three-Pillar Approach to Cyber Security

By: David Mundy July 5, 2023

Safeguarding Sensitive Data in the Digital Age

By: David Mundy June 21, 2023

Our Guide to Securing Data Lakes and Data Warehouses

By: David Mundy June 16, 2023

Decoding Data Breaches: An Analysis of Verizon's 2023 Report

By: David Mundy June 16, 2023

Dasera Wins Products that Count Award

By: David Mundy March 20, 2023

2023 Women in Security Forum Power 100 Winner

By: David Mundy March 20, 2023

Celebrating Success: Dasera Wins Gold Globee Award for Data Governance

By: David Mundy March 20, 2023