Blog
Our expert views on data security and data privacy issues.
Our expert views on data security and data privacy issues.
.webp)
Enable Data Security Posture Management (DSPM) for Your Entire Data Estate
Oct 8, 2025

Why ROT Data Must be Effectively Managed: Definition and Best Practices
Sep 7, 2024

Navigating the Data Tsunami: Why Network-Centric Discovery is Crucial for Modern Enterprises
Nov 23, 2023

Shadow AI – The Blind Spot That’s Already Costing You
Oct 1, 2025

The Cyber Attack That Stalled Jaguar Land Rover: A Cautionary Tale of Hyper-Connectivity
Oct 15, 2025

Why Contextual Data Intelligence Is Better Together: DSPM and Security Data Lakes
Jun 4, 2025

Data Governance Without DSPM is Just a Policy Binder
Oct 8, 2025

Cloud Risks Are Soaring: How to Stay Ahead in Data Security
Mar 17, 2025

Enterprise DSPM Has Evolved—Here’s What That Means for You
Apr 3, 2025

Everything You Need to Know About Data Security Posture Management (DSPM)
Feb 10, 2025

5 Ways to Reduce Your Cyber Threat Attack Surface
Oct 29, 2024

How to Create and Implement a DSPM Program
Mar 3, 2025

Structured and Unstructured Data: A Simple Guide for Data Security
Nov 19, 2024

7 AI Trends That Will Transform Data Security in 2025
Jan 27, 2025

1touch.io Brings SaaS Deployment to Its Sensitive Data Intelligence Platform
Jan 15, 2025

Mainframe Modernization Strategies: Boosting Security and Compliance | 1touch Insights
Aug 8, 2024

Cloud Data Security: Best Practices for Financial Institutions
May 29, 2024

What is Data Security Posture Management?
Aug 20, 2024

The Ultimate Guide to Data Mapping: Basics, Terms, Best Practices, and More
Sep 4, 2024

The Necessity of Mainframe Data Discovery and Classification | 1touch Insights
Jul 8, 2024

Quebec’s Law 25: The DSAR Compliance Deadline Every Business Should Know
Apr 16, 2024

How Automated Data Discovery Transforms Data Management and Compliance
Apr 9, 2024

Cloud Migration Best Practices: Mitigating Risks and Optimizing Costs
Apr 24, 2024

Transparency, Compliance, and Data Protection: Adapting to New Regulations in the Financial Industry
Apr 30, 2024

Cyber Resilience in Action: Advanced Incident Response Strategies
Mar 26, 2024

Crafting an Effective Data Classification Policy for Enhanced Security and Compliance
Feb 21, 2024

Cyber Resilience in Action: A Two-Part Guide to Transforming Data Breach Response
Mar 19, 2024

Compliance Checklist: 10 Essential Questions to Prepare for Data Security Audits
Feb 15, 2024

Protecting Sensitive Personal Information: Steps to Ensure Data Privacy in Healthcare
Apr 2, 2024

My Exciting New Adventure: Why I Chose 1touch.io
Nov 21, 2023

How AI is Transforming Data Governance in 2023
Nov 7, 2023

1touch.io Sets New Standards in Data Discovery Accuracy and Throughput
Nov 28, 2023

Enhancing Cybersecurity with XBOMs and the Emergence of Data Bill of Materials (DBOM)
Jan 17, 2024

Managing the Risks of Generative AI: The Critical Role of Data Governance
Oct 18, 2023

CCPA 2.0 Gets Closer to Reality! But How Does it Compare to GDPR?
Nov 22, 2022

The Three Little Pigs is NOT a Fairy Tale
Feb 8, 2021

IBM and 1touch.io announce a breakthrough solution to increase value for GDP customers with IBM Secu
Oct 25, 2022

Tokenization — Is it the Right Strategy to Protect Your PII?
Jan 14, 2021

Sensitive Data Discovery: The 1touch.io Inventa Way
Nov 22, 2022

Healthcare Data: Privacy and Utility for Regulation
Nov 22, 2022

Top Data Security Challenges In The Insurance Industry
Feb 27, 2023

Sensitive Data Discovery and Classification Explained
Sep 28, 2021

IBM Security Discover and Classify: A New Era in the IBM Security and 1touch.io Partnership
Nov 2, 2021

On-Demand: Fearless with Zero Trust – Data Discovery and Classification for Privacy and Security
Nov 22, 2022

Demystifying Proposition 24 (CPRA/CCPA 2.0)
Nov 22, 2022

The Zero Trust model might be the right approach.eBook: Zero Trust for Sustainable Data Discovery
Nov 22, 2022

1touch.io Inventa 3.3 Release
Mar 10, 2023
Prepare for Your Data Discovery Journey and Gain Sensitive Data Intelligence!
Jan 8, 2023

1touch.io Inventa 3.4 Release
May 9, 2023

Dude, Where’s My Encryption?
Mar 23, 2023

Unpacking Sensitive Data Intelligence: The Cornerstone of Proactive Data-Centric Security
Oct 6, 2023

Subrogation: What Basketball taught me about 3rd party risk
Mar 16, 2023

What do you really inherit in an acquisition?
May 24, 2023

PII Data Vulnerability Management in Today’s Hybrid Work Landscape
Oct 13, 2023

The Essential Steps for Secure Third-Party Data Sharing: A Practical Guide for Security Architects
Jun 13, 2023

1touch.io Inventa 3.5 Release!
Jun 6, 2023

Sensitive Data Intelligence: The Future of Cybersecurity
Jun 28, 2023

Safeguarding Sensitive Data: Uncovering the Top Ten Security Challenges in the Hospitality Industry
Jul 6, 2023

Enhancing Enterprise Security: Attack Surface Reduction and Data Minimization Strategies
Jul 19, 2023

Addressing Data Security and Governance in the Age of Generative AI
Jul 26, 2023

The Shift-Left Approach to Data Protection
Aug 9, 2023

Mastering the New SEC Cybersecurity Disclosure Rule
Aug 2, 2023

Proactive Data Security in Hospitality and Travel: A CISO’s Playbook—Part 3
Aug 30, 2023

Data Security in Hospitality and Travel: A CISO’s Playbook—Part 1
Aug 16, 2023

Third-Party Data Risks in Hospitality and Travel: A CISO’s Playbook—Part 2
Aug 23, 2023

Keeping Up with Ever-Changing Privacy Regulations
Oct 1, 2020

PII Data Vulnerability Management in the Hybrid Work Model
Oct 25, 2021

4 Ways Mishandling Sensitive Data Wastes Your Time
Oct 13, 2021

Strategies for Accurate Unstructured Data Discovery
Dec 13, 2023
Dear CISO: Where to Look for Personal Data
Jan 24, 2019
Privacy Shield Does NOT Equal GDPR Compliance
Dec 10, 2018
C is For Cookie and Compliance
Jun 15, 2019
It’s Your Right. Do it Right.
Feb 11, 2019
1touch.io + Anjuna: Next-Gen Solutions to Enduring Problems
Apr 20, 2023
Does ISO 27001 Certification Give You Immunity From GDPR Fines?
Dec 26, 2018
Dear CISO: Partial Inventory is No Inventory at All
Feb 4, 2019
Returning Control of Our Personal Data – Hurrah for CCPA
Dec 10, 2018
Discovery. Discovery. Discovery. The Rest is Salad Dressing.
Dec 10, 2018
Seeing is Believing
Dec 10, 2018
Data Privacy Detective Podcast Episode 32 – Discovering Personal Data: How the Unknown Becomes Known
Mar 19, 2019
Part 1: Introduction and Resources of the Data Breach
Jul 31, 2019
Digital Guardian: Overcoming Common Pitfalls to Data Discovery and Classification
Jun 6, 2019
The Evolving Levels of Effort
Feb 18, 2019
The U.S. and Europe are Approaching GDPR and Data Privacy Very Differently
May 8, 2019
Part 1: On the Convergence of Data Privacy and Data Security
Nov 26, 2019
A Controlled and Happy Family
Jun 22, 2019
Dear CISO: Who is Responsible for the Privacy of Data Subjects?
Jun 24, 2019
Are Enterprise and Consumer Interests Aligned?
Apr 15, 2019
Keeping it Private for the Good of the Company
Feb 21, 2019
GDPR Weekly Podcast – 1touch.io
Jul 10, 2019
Part 2: Standard Ways to De-Identify Personal Data
Jul 31, 2019
Making Your Customer the Hero
Mar 9, 2020
Google Maps and PII Repositories
Mar 4, 2020
The Privacy Regulations Shift
Feb 11, 2020
Part 3: Machine Learning Ways to De-Identify Personal Data (Homomorphic Encryption)
Jul 31, 2019
PI and Working From Home — Don’t Betray Your Customers’ Trust
May 11, 2020
High-Level Overview of 1touch.io’s Inventa
Mar 17, 2020
Part 4: Standard Ways to Process Datasets with QI Values
Jul 31, 2019
The Who, Why and What’s in It for Them of Successful
Mar 17, 2020
1touch.io’s Inventa and Regulatory Compliance CCPA
Mar 17, 2020