Read our NEW White Paper: Managing Data Risk For Your AI Applications ->
Read Now!
Platform
Overview
Integrations
What's New
Use Cases
Resources
Whitepapers
Datasheets
Webinars
Buyer's Framework
Case Studies
E-Books
Videos
Our Blog
Podcast
Quick Start
Glossary
Council
About Us
Company
Careers
Contact Us
Newsroom
Trust and Security
Get Demo
Events
Partners
Pricing
Platform
Overview
Integrations
What's New
Use Cases
Resources
Whitepapers
Datasheets
Webinars
Buyer's Framework
Case Studies
E-Books
Videos
Our Blog
Podcast
Quick Start
Glossary
Council
About Us
Company
Careers
Contact Us
Newsroom
Trust and Security
Get Demo
Events
Partners
Pricing
Data Security
,
Cloud Data Protection
Security Controls and Automation: Protecting Sensitive Data in the Cloud
By:
David Mundy
|
April 18, 2024
Subscribe to Our Blog
Stay up to date with the latest tips and news in data security
ALL
Company News
Data Breaches
Industry News
Product
Data Security
,
Cloud Data Protection
Security Controls and Automation: Protecting Sensitive Data in the Cloud
By:
David Mundy
April 18, 2024
Data Security
,
2024
Pay as You Grow: A Modern Way to Buy and Use Data Security
By:
David Mundy
April 17, 2024
Data Security
,
dspm
AI Data Security: The Integrated Power of Databricks' DASF and DSPM
By:
David Mundy
April 16, 2024
Data Security
,
Healthcare
Healthcare Data Security: Protecting Patient Privacy
By:
David Mundy
April 12, 2024
Data Security
,
dspm
Data Protection for Remote Workers
By:
David Mundy
April 4, 2024
Data Security
,
dspm
DSPM in Third-Party Integrations and Supply Chain
By:
David Mundy
March 22, 2024
Data Security
,
2024
Data Warehouse Compliance Checklist
By:
David Mundy
March 20, 2024
Data Security
,
dspm
Optimizing Data Security Posture in Remote Work Environments
By:
David Mundy
March 12, 2024
Data Security
,
Data Classification
A Practical Guide to Advanced Data Classification Strategies
By:
David Mundy
March 8, 2024
Data Security
,
dspm
The Future of Data Security and GRC
By:
David Mundy
February 22, 2024
Data Security
,
2024
Strengthening Third-Party Data Collaborations in AI-Driven Enterprises
By:
David Mundy
February 1, 2024
Data Security
,
dspm
Enhancing Data Security and Governance with Automated Controls
By:
David Mundy
January 25, 2024
Data Security
,
2024
Shifting to DevSecOps: Enhancing Security with DSPM
By:
David Mundy
January 19, 2024
Data Security
,
2024
A Strategic Approach to Mitigating Insider Threats
By:
David Mundy
January 17, 2024
Data Security
,
2024
Driving Data Security and Governance in a Multi-Cloud Environment
By:
David Mundy
January 15, 2024
Data Security
,
2024
Securing and Governing Training Data for Enterprise AI Applications
By:
David Mundy
January 4, 2024
Data Security
,
dspm
A Deeper Dive into Dasera's Approach to Data Security
By:
David Mundy
December 7, 2023
Data Security
,
dspm
Dasera - 8 Essential Tips for Strengthening Your Organization's Data Security Posture with Dasera
By:
David Mundy
December 1, 2023
Data Security
,
dspm
Dasera's Guide to Mastering ISO/IEC 27001 Certification
By:
David Mundy
November 30, 2023
Data Security
,
dspm
Securing M&A Success: Mastering Data Security with DSPM
By:
David Mundy
November 29, 2023
Data Security
,
Healthcare
Securing Patient Data in Healthcare: The Power of DSPM with Dasera
By:
David Mundy
November 27, 2023
Data Security
,
dspm
Navigating Data Security in the AI-Driven Age
By:
David Mundy
November 22, 2023
Data Security
,
dspm
Securing Your Finances Online: Understanding the Impact of FTC's New Rules and the Advent of Open Banking
By:
David Mundy
November 20, 2023
Data Security
,
dspm
How Fintech is Forging New Paths in Data Security with DSPM
By:
David Mundy
November 16, 2023
Data Security
,
Risk Detection
Dasera's Recognition in Gartner's 2023 Market Guide for Insider Threats
By:
David Mundy
November 14, 2023
Data Security
,
dspm
Strengthening Data Security: The Guide to DSPM with Dasera
By:
David Mundy
November 7, 2023
Data Security
,
dspm
A Guide to Proactive Data Security with Advanced Posture Management
By:
David Mundy
October 30, 2023
Data Security
,
Data Compliance
Comprehensive FAQs on Dasera's Data Security Platform: Your Ultimate Guide
By:
David Mundy
October 25, 2023
Data Security
,
dspm
Leveraging Data Security Posture Management to Defend Against Cyber Risk
By:
David Mundy
October 16, 2023
Data Security
,
dspm
Redefining Financial Data Protection with DSPM Solutions
By:
David Mundy
October 11, 2023
Data Security
,
Data Governance
Integrating DSPM in DevSecOps for Enhanced Data Security and Governance
By:
David Mundy
October 5, 2023
Data Security
,
dspm
Guarding the Goldmine: Structured Data Protection to ‘Secure the World’ this Cybersecurity Month
By:
David Mundy
October 2, 2023
Data Security
,
Healthcare
Strengthening Data Security in Healthcare with DSPM
By:
David Mundy
September 28, 2023
Data Security
,
dspm
Streamlining Data Security for E-commerce with DSPM
By:
David Mundy
September 26, 2023
Data Security
,
dspm
Securing Mixed Data Environments with Data Security Posture Management
By:
David Mundy
September 21, 2023
Data Security
,
dspm
Achieving Data Compliance in the Age of Data Privacy Regulations through DSPM
By:
David Mundy
September 18, 2023
Data Security
,
dspm
Enhancing DSPM: Beyond Traditional Limitations
By:
David Mundy
September 11, 2023
Data Security
,
dspm
The Benefits and Application of DSPM
By:
David Mundy
September 7, 2023
Data Security
,
dspm
Understanding DSPM and Its Role in Modern Data Security
By:
David Mundy
September 5, 2023
Data Security
,
Data Classification
Enhancing Cloud Security with DSPM for a Resilient Data Infrastructure
By:
Tyler Mathis
August 24, 2023
Data Security
,
Data Breaches
Enhancing Data Security in Cloud Environments: Best Practices and Automation Benefits
By:
David Mundy
August 16, 2023
Data Security
,
SQL Queries
Navigating the New Era of Data Security with Dasera: Pioneering Data-in-Use Monitoring and Query Analysis
By:
David Mundy
August 9, 2023
Data Security
,
Data Warehouse
Achieve Regulatory Compliance in Data Warehouses and Data Lakes with Dasera
By:
Dasera
August 4, 2023
Data Security
,
Data Breaches
The True Cost of Data Breaches: Why Companies Must Partner with Security Providers
By:
David Mundy
July 26, 2023
Data Security
,
Data Warehouse
Mastering the Shared Responsibility Model: Secure Cloud Data Lakes & Data Warehouses
By:
David Mundy
July 21, 2023
Data Security
,
Data Lifecycle Security
Enabling Data Access Governance in Data Lakes
By:
David Mundy
July 21, 2023
Data Security
,
Data Governance
Mastering the Puzzle of Governance and Security
By:
David Mundy
July 7, 2023
Data Security
,
Data Privacy
Safeguarding Sensitive Data in the Digital Age
By:
David Mundy
June 21, 2023
Data Security
,
Data Warehouse
Our Guide to Securing Data Lakes and Data Warehouses
By:
David Mundy
June 16, 2023
Data Security
,
Data Compliance
DataGovOps: Fixing the Broken Promise of Data Governance
By:
Ani Chaudhuri
July 5, 2022
Data Security
,
Data Compliance
Data Governance: It Takes a Village (and Good Infrastructure)
By:
Dasera
May 18, 2022
Data Security
,
Award
Dasera Named Gold Winner for 2022 Cybersecurity Excellence Awards for Cloud Data Security
By:
Erin Swanson
February 8, 2022
Data Security
,
Dasera
Decentralize Your Cloud Data Security
By:
Thi Thumasathit
January 20, 2022
Data Security
,
Cloud Data Protection
Mitigating the Risk of Data in the Cloud
By:
Alexa Rzasa
January 6, 2022
Data Security
,
Industry News
How to Prevent the Common HIPAA Violations in the Cloud
By:
Alexa Rzasa
January 4, 2022
Data Security
,
Industry News
The State of Data Security: The Cost of Digitization and Cloud Adoption
By:
Tu Phan
September 17, 2021
Data Security
,
Industry News
OWASP Announces Top 10 Web Application Security Threats for 2021
By:
Ani Chaudhuri
September 15, 2021
Data Security
,
Data Breaches
Data Security: How to Protect Your Data From Data Breaches
By:
Thi Thumasathit
September 7, 2021
Data Security
,
Data Lifecycle Security
Securing the Data Lifecycle Key to Data Security and Compliance
By:
Ani Chaudhuri
April 14, 2021
Data Security
,
Cybersecurity
Dasera Infographic: Protecting Student Data
By:
Tu Phan
January 12, 2021
Insider Threats
,
Data Security
The Limitations of Training and Trust: What We can Learn About Insider Threats from the Coronavirus Pandemic
By:
Thi Thumasathit
June 30, 2020
Insider Threats
,
Data Security
20 Must-Read Insider Threat Blogs for 2020
By:
Thi Thumasathit
June 2, 2020
Data Security
,
Dasera
Why we started Dasera?
By:
Ani Chaudhuri
March 9, 2020
All posts