Blog
Our expert views on data security and data privacy issues.
Our expert views on data security and data privacy issues.

Context, Cognition, and the Poisoned Mushroom Problem: Why AI Readiness Depends on Data Understanding
Jan 16, 2026

The Cyber Attack That Stalled Jaguar Land Rover: A Cautionary Tale of Hyper-Connectivity
Oct 15, 2025
.webp)
Enable Data Security Posture Management (DSPM) for Your Entire Data Estate
Oct 8, 2025

Data Governance Without DSPM is Just a Policy Binder
Oct 8, 2025

Shadow AI – The Blind Spot That’s Already Costing You
Oct 1, 2025

Why Contextual Data Intelligence Is Better Together: DSPM and Security Data Lakes
Jun 4, 2025

Enterprise DSPM Has Evolved—Here’s What That Means for You
Apr 3, 2025

Cloud Risks Are Soaring: How to Stay Ahead in Data Security
Mar 17, 2025

1touch.io Reports Record-Breaking Year-Over-Year Growth, Expands Fortune 500 Customer Base, and Welcomes Global Visionary to Its Board
Mar 5, 2025

How to Create and Implement a DSPM Program
Mar 3, 2025

Everything You Need to Know About Data Security Posture Management (DSPM)
Feb 10, 2025

7 AI Trends That Will Transform Data Security in 2025
Jan 27, 2025

1touch.io Brings SaaS Deployment to Its Sensitive Data Intelligence Platform
Jan 15, 2025

Structured and Unstructured Data: A Simple Guide for Data Security
Nov 19, 2024

5 Ways to Reduce Your Cyber Threat Attack Surface
Oct 29, 2024

Why ROT Data Must be Effectively Managed: Definition and Best Practices
Sep 7, 2024

The Ultimate Guide to Data Mapping: Basics, Terms, Best Practices, and More
Sep 4, 2024

What is Data Security Posture Management?
Aug 20, 2024

Mainframe Modernization Strategies: Boosting Security and Compliance | 1touch Insights
Aug 8, 2024

The Necessity of Mainframe Data Discovery and Classification | 1touch Insights
Jul 8, 2024

Cloud Data Security: Best Practices for Financial Institutions
May 29, 2024

Transparency, Compliance, and Data Protection: Adapting to New Regulations in the Financial Industry
Apr 30, 2024

Cloud Migration Best Practices: Mitigating Risks and Optimizing Costs
Apr 24, 2024

Quebec’s Law 25: The DSAR Compliance Deadline Every Business Should Know
Apr 16, 2024

How Automated Data Discovery Transforms Data Management and Compliance
Apr 9, 2024

Protecting Sensitive Personal Information: Steps to Ensure Data Privacy in Healthcare
Apr 2, 2024

Cyber Resilience in Action: Advanced Incident Response Strategies
Mar 26, 2024

Cyber Resilience in Action: A Two-Part Guide to Transforming Data Breach Response
Mar 19, 2024

Crafting an Effective Data Classification Policy for Enhanced Security and Compliance
Feb 21, 2024

Compliance Checklist: 10 Essential Questions to Prepare for Data Security Audits
Feb 15, 2024

Enhancing Cybersecurity with XBOMs and the Emergence of Data Bill of Materials (DBOM)
Jan 17, 2024

Strategies for Accurate Unstructured Data Discovery
Dec 13, 2023

1touch.io Sets New Standards in Data Discovery Accuracy and Throughput
Nov 28, 2023

Navigating the Data Tsunami: Why Network-Centric Discovery is Crucial for Modern Enterprises
Nov 23, 2023

My Exciting New Adventure: Why I Chose 1touch.io
Nov 21, 2023

How AI is Transforming Data Governance in 2023
Nov 7, 2023

Managing the Risks of Generative AI: The Critical Role of Data Governance
Oct 18, 2023

PII Data Vulnerability Management in Today’s Hybrid Work Landscape
Oct 13, 2023

Unpacking Sensitive Data Intelligence: The Cornerstone of Proactive Data-Centric Security
Oct 6, 2023
10 Ways to Enhance Data Loss Prevention Effectiveness
Sep 13, 2023
Maximizing Operational Efficiency and Sensitive Data Protection with Inventa 3.6
Sep 6, 2023

Proactive Data Security in Hospitality and Travel: A CISO’s Playbook—Part 3
Aug 30, 2023

Third-Party Data Risks in Hospitality and Travel: A CISO’s Playbook—Part 2
Aug 23, 2023

Data Security in Hospitality and Travel: A CISO’s Playbook—Part 1
Aug 16, 2023

The Shift-Left Approach to Data Protection
Aug 9, 2023

Mastering the New SEC Cybersecurity Disclosure Rule
Aug 2, 2023

Addressing Data Security and Governance in the Age of Generative AI
Jul 26, 2023

Enhancing Enterprise Security: Attack Surface Reduction and Data Minimization Strategies
Jul 19, 2023
Building a Resilient Data Security Infrastructure
Jul 12, 2023

Safeguarding Sensitive Data: Uncovering the Top Ten Security Challenges in the Hospitality Industry
Jul 6, 2023

Sensitive Data Intelligence: The Future of Cybersecurity
Jun 28, 2023
The Impact of AI and Machine Learning in Data Security: Elevating Protection for the Digital Age
Jun 21, 2023

The Essential Steps for Secure Third-Party Data Sharing: A Practical Guide for Security Architects
Jun 13, 2023

1touch.io Inventa 3.5 Release!
Jun 6, 2023

What do you really inherit in an acquisition?
May 24, 2023

1touch.io Inventa 3.4 Release
May 9, 2023
1touch.io + Anjuna: Next-Gen Solutions to Enduring Problems
Apr 20, 2023

Dude, Where’s My Encryption?
Mar 23, 2023

Subrogation: What Basketball taught me about 3rd party risk
Mar 16, 2023

1touch.io Inventa 3.3 Release
Mar 10, 2023

Top Data Security Challenges In The Insurance Industry
Feb 27, 2023
Prepare for Your Data Discovery Journey and Gain Sensitive Data Intelligence!
Jan 8, 2023

CCPA 2.0 Gets Closer to Reality! But How Does it Compare to GDPR?
Nov 22, 2022
GDPR vs. CCPA
Nov 22, 2022

Sensitive Data Discovery: The 1touch.io Inventa Way
Nov 22, 2022

Healthcare Data: Privacy and Utility for Regulation
Nov 22, 2022

On-Demand: Fearless with Zero Trust – Data Discovery and Classification for Privacy and Security
Nov 22, 2022

Demystifying Proposition 24 (CPRA/CCPA 2.0)
Nov 22, 2022

The Zero Trust model might be the right approach.eBook: Zero Trust for Sustainable Data Discovery
Nov 22, 2022

IBM and 1touch.io announce a breakthrough solution to increase value for GDP customers with IBM Secu
Oct 25, 2022
Uber Breach and the Need for Data Visibility
Oct 11, 2022

IBM Security Discover and Classify: A New Era in the IBM Security and 1touch.io Partnership
Nov 2, 2021

PII Data Vulnerability Management in the Hybrid Work Model
Oct 25, 2021

4 Ways Mishandling Sensitive Data Wastes Your Time
Oct 13, 2021

Sensitive Data Discovery and Classification Explained
Sep 28, 2021
Trusted Data Analytics for Effective Decision-Making
Mar 15, 2021

The Three Little Pigs is NOT a Fairy Tale
Feb 8, 2021

Tokenization — Is it the Right Strategy to Protect Your PII?
Jan 14, 2021
The Era of Digital Transformation: Building A Privacy and Security Practice in the Ever-Changing Lan
Oct 27, 2020
1touch.io @ Privacy + Security Forum (FALL Academy)
Oct 15, 2020
Demand for Healthcare Data Visualization for Better Protection
Oct 13, 2020

Keeping Up with Ever-Changing Privacy Regulations
Oct 1, 2020
What does Chocolate Have to do With Maintaining Privacy Regulations…
Sep 11, 2020
Great Expectations: Identifying Non-Secured Personal Data for CCPA
Sep 7, 2020
CCPA is Here; How Does its Definition of Personal Information Compare to GDPR?
Aug 10, 2020
Real Discovery of Personal Data Usage is the New Green
Aug 4, 2020
Are You Striking Out With Your DSAR Duties?
Jul 23, 2020
The Necessity of ZERO Trust in Data Discovery for Privacy
Jul 21, 2020
Data Privacy During Economic Downturn: How to Make It Work With Limited Resources?
Jul 17, 2020
Achieving Compliance with Data Protection Regulations
Jul 13, 2020
IAPP Privacy and Regulations: What’s Next After CCPA
Jul 10, 2020
CCPA 2.0 Gets Closer to Reality! But How Does it Compare to GDPR?
Jul 8, 2020
YAPR – Yet Another Privacy Regulation – An LGPD Primer
Jun 26, 2020
It’s Time to Organize—How to Inventorize Your Mess of Data
Jun 18, 2020
Every Second of Every Day, 1.7MB of Data is Created for Every Person – Here’s How We Can Get Control
Jun 17, 2020
What Have We Learned About GDPR Over The Last Two Years?
Jun 16, 2020
2nd Generation Privacy Technology for Sustainability
Jun 15, 2020
1touch.io Secures $14M Series A Funding Round!
Jun 3, 2020
PI and Working From Home — Don’t Betray Your Customers’ Trust
May 11, 2020
GDPR vs. CCPA
Mar 30, 2020