DSPM in Third-Party Integrations and Supply Chain

By: David Mundy March 22, 2024

Data Warehouse Compliance Checklist

By: David Mundy March 20, 2024

Optimizing Data Security Posture in Remote Work Environments

By: David Mundy March 12, 2024

A Practical Guide to Advanced Data Classification Strategies

By: David Mundy March 8, 2024

Your Guide to Protecting Sensitive AI Training Data

By: David Mundy March 1, 2024

Protecting PII Data in AI Applications

By: David Mundy February 26, 2024

The Future of Data Security and GRC

By: David Mundy February 22, 2024

Questions on Data Security & Governance

By: David Mundy February 20, 2024

Securing Against Insider Threats: A DSPM Strategy

By: David Mundy February 16, 2024

Navigating HIPAA Regulation 164.308: Administrative Safeguards for Healthcare Practices

By: David Mundy February 7, 2024

Strengthening Third-Party Data Collaborations in AI-Driven Enterprises

By: David Mundy February 1, 2024

Beyond Data Privacy Day: Embracing Continuous Data Protection

By: David Mundy January 30, 2024

Enhancing Data Security and Governance with Automated Controls

By: David Mundy January 25, 2024

Shifting to DevSecOps: Enhancing Security with DSPM

By: David Mundy January 19, 2024

A Strategic Approach to Mitigating Insider Threats

By: David Mundy January 17, 2024

Driving Data Security and Governance in a Multi-Cloud Environment

By: David Mundy January 15, 2024

Securing and Governing Training Data for Enterprise AI Applications

By: David Mundy January 4, 2024

Your Guide to Securing the Data Lifecycle

By: David Mundy December 27, 2023

Making Sense of Data Governance

By: David Mundy December 22, 2023

The Complexities of Data Security: Insights from Top CISOs

By: David Mundy December 19, 2023

A Deeper Dive into Dasera's Approach to Data Security

By: David Mundy December 7, 2023

Dasera - 8 Essential Tips for Strengthening Your Organization's Data Security Posture with Dasera

By: David Mundy December 1, 2023

Dasera's Guide to Mastering ISO/IEC 27001 Certification

By: David Mundy November 30, 2023

Securing M&A Success: Mastering Data Security with DSPM

By: David Mundy November 29, 2023

Securing Patient Data in Healthcare: The Power of DSPM with Dasera

By: David Mundy November 27, 2023

Navigating Data Security in the AI-Driven Age

By: David Mundy November 22, 2023

Securing Your Finances Online: Understanding the Impact of FTC's New Rules and the Advent of Open Banking

By: David Mundy November 20, 2023

How Fintech is Forging New Paths in Data Security with DSPM

By: David Mundy November 16, 2023

Dasera's Recognition in Gartner's 2023 Market Guide for Insider Threats

By: David Mundy November 14, 2023

Strengthening Data Security: The Guide to DSPM with Dasera

By: David Mundy November 7, 2023

The Double-Edged Promise of Biden's AI Executive Order

By: David Mundy November 3, 2023

A Guide to Proactive Data Security with Advanced Posture Management

By: David Mundy October 30, 2023

Comprehensive FAQs on Dasera's Data Security Platform: Your Ultimate Guide

By: David Mundy October 25, 2023

Leveraging Data Security Posture Management to Defend Against Cyber Risk

By: David Mundy October 16, 2023

Redefining Financial Data Protection with DSPM Solutions

By: David Mundy October 11, 2023

Integrating DSPM in DevSecOps for Enhanced Data Security and Governance

By: David Mundy October 5, 2023

Guarding the Goldmine: Structured Data Protection to ‘Secure the World’ this Cybersecurity Month

By: David Mundy October 2, 2023

Strengthening Data Security in Healthcare with DSPM

By: David Mundy September 28, 2023

Streamlining Data Security for E-commerce with DSPM

By: David Mundy September 26, 2023

April Slayden- 2023 SC Media Women in IT Security honorees

By: David Mundy September 22, 2023

Securing Mixed Data Environments with Data Security Posture Management

By: David Mundy September 21, 2023

Achieving Data Compliance in the Age of Data Privacy Regulations through DSPM

By: David Mundy September 18, 2023

Enhancing DSPM: Beyond Traditional Limitations

By: David Mundy September 11, 2023

Dasera Wins Platinum Data Governance Award at Security Today's 2023 New Product of the Year

By: David Mundy September 8, 2023

The Benefits and Application of DSPM

By: David Mundy September 7, 2023

Understanding DSPM and Its Role in Modern Data Security

By: David Mundy September 5, 2023

Enhancing Cloud Security with DSPM for a Resilient Data Infrastructure

By: Tyler Mathis August 24, 2023

Embrace DevSecOps with Data Security Posture Management for Comprehensive Protection

By: David Mundy August 16, 2023

Enhancing Data Security in Cloud Environments: Best Practices and Automation Benefits

By: David Mundy August 16, 2023

Navigating the New Era of Data Security with Dasera: Pioneering Data-in-Use Monitoring and Query Analysis

By: David Mundy August 9, 2023

Achieve Regulatory Compliance in Data Warehouses and Data Lakes with Dasera

By: Dasera August 4, 2023

Emerging Data Security Trends and Challenges

By: David Mundy July 27, 2023

The True Cost of Data Breaches: Why Companies Must Partner with Security Providers

By: David Mundy July 26, 2023

Mastering the Shared Responsibility Model: Secure Cloud Data Lakes & Data Warehouses

By: David Mundy July 21, 2023

Enabling Data Access Governance in Data Lakes

By: David Mundy July 21, 2023

Mastering the Puzzle of Governance and Security

By: David Mundy July 7, 2023

Protecting Your Data: The Three-Pillar Approach to Cyber Security

By: David Mundy July 5, 2023

Safeguarding Sensitive Data in the Digital Age

By: David Mundy June 21, 2023

Our Guide to Securing Data Lakes and Data Warehouses

By: David Mundy June 16, 2023

Decoding Data Breaches: An Analysis of Verizon's 2023 Report

By: David Mundy June 16, 2023

Dasera Wins Products that Count Award

By: David Mundy March 20, 2023

2023 Women in Security Forum Power 100 Winner

By: David Mundy March 20, 2023

Celebrating Success: Dasera Wins Gold Globee Award for Data Governance

By: David Mundy March 20, 2023

Operationalizing Data Security

By: David McCaw March 10, 2023

Crossing the Chasm to Data Security Automation

By: Tyler Mathis February 15, 2023

Level-up Your Company’s Security Awareness

By: Tyler Mathis January 26, 2023

Data De-identification and HIPAA

By: Lee Isenman January 10, 2023

The Wind Cave Release

By: Deepti Hemwani December 14, 2022

Announcing Our Crater Lake Release

By: Deepti Hemwani August 17, 2022

DataGovOps: Fixing the Broken Promise of Data Governance

By: Ani Chaudhuri July 5, 2022

Dasera Selected as Finalist for SC Awards

By: Dasera May 19, 2022

Data Governance: It Takes a Village (and Good Infrastructure)

By: Dasera May 18, 2022

Dasera a Most Innovative Startup Finalist at RSAC 2022

By: Dasera May 4, 2022

We're a 2022 SIIA CODiE Award Finalist for Best Emerging Technology

By: Dasera April 26, 2022

Announcing Dasera's Mt. Rainier 4.0 Release

By: Deepti Hemwani March 8, 2022

Dasera Wins Three 2022 Cyber Security Global Excellence Awards

By: Thi Thumasathit March 2, 2022

Dasera Named Gold Winner for 2022 Cybersecurity Excellence Awards for Cloud Data Security

By: Erin Swanson February 8, 2022

Dasera Achieves SOC 2 Type 2 Compliance for Its Data Security Platform Offering

By: April Slayden Mitchell February 4, 2022

Decentralize Your Cloud Data Security

By: Thi Thumasathit January 20, 2022

Mitigating the Risk of Data in the Cloud

By: Alexa Rzasa January 6, 2022

How to Prevent the Common HIPAA Violations in the Cloud

By: Alexa Rzasa January 4, 2022

The CISO Perspective on Cloud Data Security

By: Alexa Rzasa December 21, 2021

Marathon, Not Sprint: Zero-Day Exploit Targeting Popular Java Library Log4j

By: Erin Swanson December 12, 2021

2022 Data Breach Industry Forecast Report: What This Means For Businesses

By: Tu Phan December 7, 2021

A Hacker’s Sweet Spot: Love on Dating Platforms

By: Tu Phan December 2, 2021

Curiosity Killed the Cat: Amazon Employees Found Snooping on Celebrity Data

By: Tu Phan November 23, 2021

Prevent Your Data From Going Rogue: Cloud Data Security Challenges & Customer Use Cases

By: April Slayden Mitchell November 20, 2021

How TikTok’s $92 Million Settlement Shows Data Privacy and Personalization at Odds

By: Tu Phan November 18, 2021

Data Lakehouses: How Secure is the Best of Both Worlds?

By: Tu Phan November 4, 2021

Interview with Selim Aissi, CISO & Data Security Advisory Board Member

By: Erin Swanson November 2, 2021

CISO Anshu Gupta Presents on Security Best Practices

By: Tu Phan October 28, 2021

Gaming Streaming Platform Twitch Hacked by Malicious Attacker

By: Tu Phan October 27, 2021

Data Classification: How to Classify Your Company's Data and Be Better Prepared for a Data-driven Future

By: Thi Thumasathit October 21, 2021

Telegraph Data Leak Exposes 10 TB of Sensitive Subscriber Data

By: Tu Phan October 19, 2021

[Cloud Security Podcast] Data Stores and Security are Two Silos in the Cloud

By: Tu Phan October 14, 2021

Cloud data protection isn't working for most companies. Here's how to fix it.

By: Thi Thumasathit October 12, 2021

[SANS Webinar] What’s the Riskiest Place on Earth? Your cloud data stores.

By: Tu Phan October 8, 2021

Database Security: The Fundamentals and the Future of Database Security in the Cloud

By: Thi Thumasathit October 6, 2021

Dasera Wins Data Security Innovation of the Year in 2021 Cybersecurity Breakthrough Awards

By: Tu Phan September 30, 2021

Watch Your Steps – 61 Million Records Exposed Including Geo Locations of Apple and FitBit Users

By: Tu Phan September 28, 2021