The states of data, Part 4: Securing data in motion through treacherous transits

In our previous blog, Data in use and why you need to keep an eye on file activities, we discussed why you should monitor how...

DataSecurity Plus 4 min read Read

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...

DataSecurity Plus , DataSecurity Plus 4 min read Read

The states of data, Part 2: Why visibility is key for protecting data at rest

In part two of our blog series, The states of data, we’ll be discussing the various threats to sensitive data at rest in the form...

DataSecurity Plus 4 min read Read