™

Demand for Healthcare Data Visualization for Better Protection

The healthcare industry is one of the most heavily regulated in the world due to the volume and sensitivity of the data entrusted to it.  As data protection regulations grow more numerous ...

How do you Protect Sensitive Data if you Can’t Even Locate it?

| | Data Discovery, data protection
Knowing what risks impact your business can give security professionals a deeper grasp of what data protection tools are required to effectively protect data stored within the perimeter. However, a major obstacle ...
What does Chocolate Have to do With Maintaining Privacy Regulations…

What does Chocolate Have to do With Maintaining Privacy Regulations…

Ever since the murmurings regarding GDPR began in 2016, achieving privacy compliance has become a common discussion (well, at least among CISOs and CIOs). While lots and lots of ink has been ...

Great Expectations: Identifying Non-Secured Personal Data for CCPA

“In a word, I was too cowardly to do what I knew to be right, as I had been too cowardly to avoid doing what I knew to be wrong.” Charles Dickens ...

Real Discovery of Personal Data Usage is the New Green

“Collective fear stimulates herd instinct, and tends to produce ferocity toward those who are not regarded as members of the herd.” Bertrand Russell Remember the early part of the century when we ...
Webinar Protect Sensitive Data on Box

Data Discovery to Rescue Historical Data from Compliance Violations

By Ishani Sircar, Manager, Product Marketing at CipherCloud As technology evolved and the world migrated to the cloud, the amount of data in the cloud increased at a rapid pace, and most ...

Don’t Skip Data Discovery During Your Compliance Program

If your business collects customer data of any kind, it’s safe to assume you’re also aware of the multitude of new privacy and security mandates. While these regulations are an ideal driver ...

Key Compliance Concepts for Financial Services

The Sarbanes-Oxley Act (SOX) was introduced following a number of financial scandals involving huge conglomerates and obliges companies to establish internal controls to prevent fraud and abuse, holding senior managers accountable for ...
risk management

Bringing Real-Time Data Discovery to the Cybersecurity Puzzle

One solution is helping organizations keep data private at rest and in motion, easing the data discovery process and helping organizations meet compliance regulations While protecting consumer privacy has always been a ...
Security Boulevard
Imperva Wins Awards for Best Database Security, Coolest Cloud Security Vendor

Imperva Wins Awards for Best Database Security, Coolest Cloud Security Vendor

SC Magazine has long been one of the most respected names in cybersecurity journalism, and one that has written about Imperva’s security research and solutions many times. So we’re proud to announce ...