What are the New FTC Requirements for GLBA?

The GLBA Overhaul: What you Need to Know New FTC data requirements are coming into effect by year’s end. The changes are expected to have a major impact across industries, including those outside the financial sector. In late 2021, the Federal Trade Commission made amendments to the Gramm-Leach-Bliley Act (GLBA) [...]

Read More

What is Cybersecurity Maturity Model Certification or CMMC?

The Defense Department certification program known as Cybersecurity Maturity Model Certification, or CMMC, is currently in the final rollout stages.    The CMMC’s official site describes the protocols as a “comprehensive framework to protect the defense industrial base” from increasingly common cyber threats.    The certification granted by the Pentagon [...]

Read More

2022 Market Guide for Data Loss Prevention (DLP)

Industry thought leader Gartner recently published its July 2022 Market Guide for Data Loss Prevention (DLP)[i]. In the thirteen-page report, Gartner laid out the most pressing needs of business networks, the data security challenges they face, and the most effective solutions. Problematic Trends The researchers first turned to the more [...]

Read More

Business Email Compromise (BEC)

Fighting business email compromise (BEC) has become one of the top challenges for enterprise security professionals. The cost of falling victim to BEC incidents has been on a sharp uptick for years, with hackers discovering more and more exploits in an increasingly vulnerable domain. This pattern began to be noticed [...]

Read More

EDM, Fingerprinting, & Accuracy in Data Security

Protecting PII is Still a Problem Protecting PII is one of the central challenges for today’s enterprises.  Firms large and small invest heavily in security budgets to ensure their networks are well protected and data remains intact. But before organizations can protect their sensitive data, they need to be able to [...]

Read More

Why Accuracy is Critical to Your Data Security Strategy

With digital advancement, data privacy and protection is crucial. Comprehensive data protection strategies are effective when businesses have complete visibility and transparency into data. Enhancing data privacy accuracy is critical for improving your organization’s overall security posture. Many organizations are unable to accurately detect sensitive data when on-premise or syncing [...]

Read More