Shallow depth of field side view of a home office with a laptop, steaming coffee, and eyeglasses.

Day In the Life of a Code42 Field CISO

| | Code42 News
6:30 am – Coffee and Catching Up with Cybersecurity News  My day begins with a cup of black coffee and a quick scan of the latest cybersecurity news. Staying on top of current trends and threats is crucial in my role as a Field CISO at Code42. Our clients rely ... Read More
Structured vs. Unstructured Data: Differences + Best Practices for Protection

Structured vs. Unstructured Data: Differences + Best Practices for Protection

| | glossary
Organizations are collecting ever-increasing amounts of structured, unstructured, and semi-structured data in the modern data landscape. According to MIT, unstructured data represents 80–90% of companies’ data collection. As the proportion of an organization’s unstructured data grows, protecting that data becomes increasingly complex, especially with traditional Data Loss Prevention (DLP) tools.  ... Read More
Computer laptop and dashboard for Cloud Data protection on cloud online database.

What is Cloud Data Protection?

| | glossary
The cloud is becoming an increasingly important part of many companies’ operations, especially when it comes to data. Whenever your company stores, transfers, or backs up data, much of it moves through cloud environments. To safeguard all that data, companies turn to cloud data protection. With cloud data protection, companies ... Read More
Drawing of a bucket with many holes, slowly leaking water enough to make a business sink.

What is a Data Leak? Causes, Examples, and Prevention

| | glossary
When sensitive information becomes available to outside sources, you have a data leak on your hands. Data leaks are real threats that are easy to ignore. But across all the places your company stores and moves data, it’s only a matter of time until an accidental exposure of information will ... Read More