Data Security

The Journey of Bringing Data Lifecycle Security to Market
In our first interview series, Ani Chaudhuri, our Co-founder and CEO, shares his thoughts on the...

Securing the Data Lifecycle Key to Data Security and Compliance
Is data the new oil or is data the new garden? If you think about data as something archived, it’s...

The Equifax Data Breach: A Deep Dive Infographic
148 million U.S. citizens saw their personal data stolen in 2017 when Equifax announced that it had...

Dasera Infographic: Protecting Student Data
When most people think of data risks, they think of big bang security breaches and compromised PII...

Five Cloud Data Threat Scenarios Only Query Analysis Can Protect You From
In today’s digital age, companies have more access than ever before to people’s PII, and general...
The Limitations of Training and Trust: What We can Learn About Insider Threats from the Coronavirus Pandemic
In March the White House and the CDC asked Americans to socially distance for 15 days to slow the...

20 Must-Read Insider Threat Blogs for 2020
CISOs and their teams have to be on their toes all the time. Businesses continuously acquire and...

Cybersecurity Mashup (Spring 2020): Insider Threats, Data Breaches, and of course COVID
Hello earthlings, look out from your windows. Winter's gone. It's spring! As you jumped from one...

Queries: the Ground Truth for Cloud Data Security
(This is a blog series on SQL Queries by the Dasera Engineering team. In this first edition, Dasera...

Why you (and everyone you know) have a blind spot for insider threats
At RSA 2020 (ah, the good old pre-pandemic days when we still had trade shows), I met with a PR...