DSPM in Third-Party Integrations and Supply Chain

By: David Mundy March 22, 2024

Data Warehouse Compliance Checklist

By: David Mundy March 20, 2024

Optimizing Data Security Posture in Remote Work Environments

By: David Mundy March 12, 2024

A Practical Guide to Advanced Data Classification Strategies

By: David Mundy March 8, 2024

The Future of Data Security and GRC

By: David Mundy February 22, 2024

Strengthening Third-Party Data Collaborations in AI-Driven Enterprises

By: David Mundy February 1, 2024

Enhancing Data Security and Governance with Automated Controls

By: David Mundy January 25, 2024

Shifting to DevSecOps: Enhancing Security with DSPM

By: David Mundy January 19, 2024

A Strategic Approach to Mitigating Insider Threats

By: David Mundy January 17, 2024

Driving Data Security and Governance in a Multi-Cloud Environment

By: David Mundy January 15, 2024

Securing and Governing Training Data for Enterprise AI Applications

By: David Mundy January 4, 2024

A Deeper Dive into Dasera's Approach to Data Security

By: David Mundy December 7, 2023

Dasera - 8 Essential Tips for Strengthening Your Organization's Data Security Posture with Dasera

By: David Mundy December 1, 2023

Dasera's Guide to Mastering ISO/IEC 27001 Certification

By: David Mundy November 30, 2023

Securing M&A Success: Mastering Data Security with DSPM

By: David Mundy November 29, 2023

Securing Patient Data in Healthcare: The Power of DSPM with Dasera

By: David Mundy November 27, 2023

Navigating Data Security in the AI-Driven Age

By: David Mundy November 22, 2023

Securing Your Finances Online: Understanding the Impact of FTC's New Rules and the Advent of Open Banking

By: David Mundy November 20, 2023

How Fintech is Forging New Paths in Data Security with DSPM

By: David Mundy November 16, 2023

Dasera's Recognition in Gartner's 2023 Market Guide for Insider Threats

By: David Mundy November 14, 2023

Strengthening Data Security: The Guide to DSPM with Dasera

By: David Mundy November 7, 2023

A Guide to Proactive Data Security with Advanced Posture Management

By: David Mundy October 30, 2023

Comprehensive FAQs on Dasera's Data Security Platform: Your Ultimate Guide

By: David Mundy October 25, 2023

Leveraging Data Security Posture Management to Defend Against Cyber Risk

By: David Mundy October 16, 2023

Redefining Financial Data Protection with DSPM Solutions

By: David Mundy October 11, 2023

Integrating DSPM in DevSecOps for Enhanced Data Security and Governance

By: David Mundy October 5, 2023

Guarding the Goldmine: Structured Data Protection to ‘Secure the World’ this Cybersecurity Month

By: David Mundy October 2, 2023

Strengthening Data Security in Healthcare with DSPM

By: David Mundy September 28, 2023

Streamlining Data Security for E-commerce with DSPM

By: David Mundy September 26, 2023

Securing Mixed Data Environments with Data Security Posture Management

By: David Mundy September 21, 2023

Achieving Data Compliance in the Age of Data Privacy Regulations through DSPM

By: David Mundy September 18, 2023

Enhancing DSPM: Beyond Traditional Limitations

By: David Mundy September 11, 2023

The Benefits and Application of DSPM

By: David Mundy September 7, 2023

Understanding DSPM and Its Role in Modern Data Security

By: David Mundy September 5, 2023

Enhancing Cloud Security with DSPM for a Resilient Data Infrastructure

By: Tyler Mathis August 24, 2023

Enhancing Data Security in Cloud Environments: Best Practices and Automation Benefits

By: David Mundy August 16, 2023

Navigating the New Era of Data Security with Dasera: Pioneering Data-in-Use Monitoring and Query Analysis

By: David Mundy August 9, 2023

Achieve Regulatory Compliance in Data Warehouses and Data Lakes with Dasera

By: Dasera August 4, 2023

The True Cost of Data Breaches: Why Companies Must Partner with Security Providers

By: David Mundy July 26, 2023

Mastering the Shared Responsibility Model: Secure Cloud Data Lakes & Data Warehouses

By: David Mundy July 21, 2023

Enabling Data Access Governance in Data Lakes

By: David Mundy July 21, 2023

Mastering the Puzzle of Governance and Security

By: David Mundy July 7, 2023

Safeguarding Sensitive Data in the Digital Age

By: David Mundy June 21, 2023

Our Guide to Securing Data Lakes and Data Warehouses

By: David Mundy June 16, 2023

DataGovOps: Fixing the Broken Promise of Data Governance

By: Ani Chaudhuri July 5, 2022

Data Governance: It Takes a Village (and Good Infrastructure)

By: Dasera May 18, 2022

Dasera Named Gold Winner for 2022 Cybersecurity Excellence Awards for Cloud Data Security

By: Erin Swanson February 8, 2022

Decentralize Your Cloud Data Security

By: Thi Thumasathit January 20, 2022

Mitigating the Risk of Data in the Cloud

By: Alexa Rzasa January 6, 2022

How to Prevent the Common HIPAA Violations in the Cloud

By: Alexa Rzasa January 4, 2022

The State of Data Security: The Cost of Digitization and Cloud Adoption

By: Tu Phan September 17, 2021

OWASP Announces Top 10 Web Application Security Threats for 2021

By: Ani Chaudhuri September 15, 2021

Data Security: How to Protect Your Data From Data Breaches

By: Thi Thumasathit September 7, 2021

Securing the Data Lifecycle Key to Data Security and Compliance

By: Ani Chaudhuri April 14, 2021

Dasera Infographic: Protecting Student Data

By: Tu Phan January 12, 2021

The Limitations of Training and Trust: What We can Learn About Insider Threats from the Coronavirus Pandemic

By: Thi Thumasathit June 30, 2020

20 Must-Read Insider Threat Blogs for 2020

By: Thi Thumasathit June 2, 2020

Why we started Dasera?

By: Ani Chaudhuri March 9, 2020