News

Info-Tech Research Group has released a new resource to help organizations tackle the growing challenges of data discovery ...
The purpose of this standard is to assist Users, Stewards, Managers, and Information Service Providers in identifying what level of security is required to protect data for which they are responsible.
Purdue University academic and administrative data are important university resources and assets. Data used by the University often contains detailed information about Purdue University as well as ...
UAB IT worked closely with information security officials from UAB Health System to develop the three level data classification system for all data. This system establishes roles and responsibilities ...
Using confidentiality, integrity, and availability to classify data. To determine the level of protections applied to a system, base your classification on the most confidential data stored in the ...
Co-Founder & CEO of SecureCircle, a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. If your company is manually classifying any data, you've already lost the ...
According to a new Forrester report on data classification and discovery, “This is a foundational capability to develop to optimize your efforts for security, privacy and compliance. You can’t protect ...
Most organisations understand the need to protect intellectual property (IP), but many struggle to identify it, according to Stephane Charbonneau, chief technology officer at security firm Titus.
The Data Access Policy defines the roles, responsibilities, data management environment, and procedures for granting access to UB’ non-public data. The University at Buffalo (UB, university) is ...