Protecting Sensitive Data: Insights and Best Practices in Light of the AT&T Breach

By: David Mundy July 26, 2024

Protecting Data with Intelligent Query Inspection

By: David Mundy July 19, 2024

Automated Data Security & Governance for Enterprise GenAI

By: David Mundy July 18, 2024

The Hidden Risks of Cloud Data Storage

By: David Mundy July 9, 2024

From PII to Access Management: Practical Approaches to Data Security, Governance, and Management

By: David Mundy July 8, 2024

Implementing DSPM: Key Steps to Secure Your Data

By: David Mundy July 2, 2024

Mastering Privileged Access Management: Tips for Keeping Your Data Safe

By: David Mundy June 24, 2024

PCI Compliance Made Simple: How Dasera Helps Protect Stored Cardholder Data and Restrict Access

By: David Mundy June 10, 2024

Tips for Data Access Governance Sucess

By: David Mundy June 7, 2024

CISA AI Guidelines

By: David Mundy May 28, 2024

Zero Trust as the Key to Data Security

By: David Mundy May 23, 2024

Managing Data Security in a Decentralized Workforce

By: David Mundy May 14, 2024

Insider Threat Protection: Strategies and Solutions to Defend Your Organization

By: David Mundy May 6, 2024

Navigating PCI DSS 4.0 Compliance: Mastering the New Standards with DSPM

By: David Mundy May 3, 2024

Protecting Sensitive Data in Big Data Environments

By: David Mundy April 30, 2024

Security Controls and Automation: Protecting Sensitive Data in the Cloud

By: David Mundy April 18, 2024

Pay as You Grow: A Modern Way to Buy and Use Data Security

By: David Mundy April 17, 2024

AI Data Security: The Integrated Power of Databricks' DASF and DSPM

By: David Mundy April 16, 2024

Healthcare Data Security: Protecting Patient Privacy

By: David Mundy April 12, 2024

Data Protection for Remote Workers

By: David Mundy April 4, 2024

Managing Risk Across Your Data Lifecycle with 'Pay as You Grow' Flexibility

By: David Mundy April 1, 2024

Data Security in Cloud Migration: What You Need to Know

By: David Mundy March 28, 2024

DSPM in Third-Party Integrations and Supply Chain

By: David Mundy March 22, 2024

Data Warehouse Compliance Checklist

By: David Mundy March 20, 2024

Optimizing Data Security Posture in Remote Work Environments

By: David Mundy March 12, 2024

A Practical Guide to Advanced Data Classification Strategies

By: David Mundy March 8, 2024

Your Guide to Protecting Sensitive AI Training Data

By: David Mundy March 1, 2024

Protecting PII Data in AI Applications

By: David Mundy February 26, 2024

The Future of Data Security and GRC

By: David Mundy February 22, 2024

Questions on Data Security & Governance

By: David Mundy February 20, 2024

Navigating HIPAA Regulation 164.308: Administrative Safeguards for Healthcare Practices

By: David Mundy February 7, 2024

Strengthening Third-Party Data Collaborations in AI-Driven Enterprises

By: David Mundy February 1, 2024

Beyond Data Privacy Day: Embracing Continuous Data Protection

By: David Mundy January 30, 2024

Enhancing Data Security and Governance with Automated Controls

By: David Mundy January 25, 2024

Shifting to DevSecOps: Enhancing Security with DSPM

By: David Mundy January 19, 2024

A Strategic Approach to Mitigating Insider Threats

By: David Mundy January 17, 2024

Driving Data Security and Governance in a Multi-Cloud Environment

By: David Mundy January 15, 2024

Securing and Governing Training Data for Enterprise AI Applications

By: David Mundy January 4, 2024