Cloud computing has, in recent years, become both an essential service used in many industries and a ubiquitous part of the daily lives of consumers. By offering remote access to computing services that can be rented out on a flexible, efficient, as-needed basis, it gives companies access to greater computer power and storage capabilities than […]
Taming Access Creep: Strategies to Rein in Unnecessary Privileges
One of the most pervasive cybersecurity challenges is “access creep” – the gradual, often unnoticed accumulation of access privileges by employees beyond what their current role requires. This phenomenon occurs when initial access rights granted for specific roles are not revoked as employees change positions or their job duties evolve. Over time, this unchecked accrual […]
Technology Audit Processes Are Broken, but Attention and Automation Can Fix Them
Technology audit processes have become increasingly important, as they tie directly to adherence to an ever-growing list of compliance frameworks and mandates such as NIST, CIS, SOC 2 ISO 27001, and others. A component of all these regulations pertains to the integrity of enterprise technology management and requires an up-to-date and accurate inventory of all […]
What Is Data Privacy? Definition, Benefits, Use Cases
Data privacy describes a set of principles and guidelines to ensure the respectful processing, protection, and handling of sensitive data linked to a person. This concept ties to who can define, observe, use, and control a person’s information and how. Typically, privacy spans two types of levels: implicit rules and written legislation. Implicit rules cover norms, behaviors, and values […]
Fundamentals of Data Classification
The process of data classification can be broadly described as the organization of data into relevant categories, allowing it to be accessed and protected more efficiently. In the simplest terms, the data classification process ranks data based on its security needs and makes it easier to locate and retrieve data. Classification is especially useful to […]
Fast-Tracking SEC Compliance with AI for GRC and Cybersecurity Disclosure
This year, the U.S. Securities and Exchange Commission (SEC) implemented rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure for Public Companies. These rules require listed companies to disclose material cybersecurity incidents within four business days and provide ongoing disclosures related to cybersecurity risk management, strategy, and governance. As the December 15 compliance deadline […]
Unlocking the Full Potential of Data Collaboration Through PETs
What’s the future of data collaboration? It’s a question that should be on the lips of every C-suite executive in global organizations right now. The unrealized potential of consumer data is immense for businesses wanting to forge deeper connections with their customers and unlock new opportunities, but many are unsure how to proceed when faced […]
From Clutter to Clarity: How Data Drives Sustainability
Deloitte’s 2023 global survey found that the threats posed by climate change are a top issue for the C-suite. Despite this, most organizations are lagging in their efforts to address the challenge, with KPMG finding that 75% of companies are not ready to have their environmental, social, and governance (ESG) data audited. And with new data regulations coming into […]
It’s Not All Clean Rooms: Pushing for a Wider Data Collaboration Category
In the rush to enrich customer data and display digital advertisements in a “privacy-sensitive fashion,” the ad industry has adopted data clean room (DCR) technology as the best path forward. There are clear benefits to rapid industry adoption – namely, increasing recognition in the industry of the need to adopt new technology that protects consumer […]
CCPA vs. GDPR: Differences and Similarities for Data Protection
The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) were created to empower individuals with greater control over their personal information. Both laws regulate the activities of organizations that collect and use data in various ways. Data protection plays an essential role in ensuring compliance with both privacy regulations. CCPA vs. […]