Think Full Disk Encryption is Good Enough? Think Again.

Most often, the word “encryption” brings to mind decryption keys and complex processes that cause friction to the end users in order to access data. Because of the friction these processes create, it’s common for businesses to use alternate forms of encryption such as disk encryption to meet business or …

CDE Scoping and Future Data Compliance Requirements: Why Data Discovery Is Crucial to PCI DSS

Last month I shared a post about prioritizing data security in the uncertain future that is 2022, whether that uncertainty pertains to existing or net new privacy laws, expansions of security controls, or other regulatory factors. One thing is for certain, this year brings with it a lot of potential …

Adjusting Data Security with the New Remote Workforce

The ongoing COVID-19 pandemic has changed nearly every aspect of our lives—some more in the short-term and others, permanently. This includes the workforce, which now functions in any combination of in-person, hybrid, and remote. While some companies already had a system in place to support employees both remotely and in …