Blogs Post

Blogs, Opinions, and Search

Edge Computing, IoT and Data Breaches In the era of high demand on data storage and organization, one of the...

GTB Data Loss Protection Gives Users the Edge The application of a robust data loss protection (DLP) program is vital...

The Encryption Burden of GDPR and the New York DFS The persistently growing threat of cyber attack has begun to...

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital...

The Importance of the Technology Behind e-Discovery Solutions   The sheer quantity and quality of data at the core of...

The Failings of Blanket Encryption As the rate and severity of data breaches increase, industry leaders in the IT sector...

Insider Threats, preventing data exfiltration The digital economy is undergoing remarkable transformation and security is being compelled to evolve as...

Which DLP Solution are you using? Sound familiar? Many organizations are now being required to discuss with their customers which...

Using a Zero Trust Approach towards Data Protection and Data Exfiltration Prevention What is Zero Trust Security? Face it, traditional...