As 2024 comes to a close, the proverb – the days are long, the years ar...
When we started Concentric AI five years ago, it was obvious that enterpr...
Have you ever considered the invisible barriers that exist within your or...
Note: this article has been updated and refreshed as of 7/17/24 As the cy...
With massive cloud migration and more data being stored and collected tha...
As 2023 comes to a close, I can’t help but reflect on the convergence o...
The shift towards a global business landscape combined with massive cloud...
In the era of big data and massive cloud migration, the importance of eff...
With massive data and cloud migration growth, collaboration and sharing h...
Concentric AI Included in Newly Created Data Security Posture Management ...
Today I’m proud to announce that Concentric has closed our series A rou...
Most of an organization’s assets are not in a constant state of change....
Concentric’s spending plenty of time on Zoom right now. We’re doing e...
There is a tectonic shift in the data security space caused by three majo...
In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find t...
Originally published in Security Boulevard
Today I’m pleased to announce the availability of two critical new ...
A customer in upstate New York, returning a copy of “The General’s Da...
“This could have had a massive, massive amount of money stolen from peo...
I recently wrote an article about how a distributed workforce and work fr...
What to expect in 2021? How the pandemic plays out will have a huge say o...
We hosted our first webinar June 23 2020 and were glad to have Featured S...
AI is the new buzzword in today’s cybersecurity market place of product...
According to industry reports, there will be an 800% increase in enterprise data, and about 80% of it will be unstructured data.
GDPR and CCPA are data privacy regulations that are redefining how busine...
Right to be Forgotten (RTBF) derives from a famous court case against Goo...
It is common knowledge that data security teams must have a proactive pla...
Managing Risk More Effectively with FAIR
According to a recent survey of cybersecurity experts in “The CISO ...
This article originally appeared in Forbes.
I recently had the chance to sit down with Aviva Zacks from SafetyDetecti...
Byron Acohido’s The Last Watchdog blog is one of the best combinati...
Dwight Eisenhower’s decision framework famously categorizes tasks based...
Since approximately last March, SolarWinds software updates have included...
If you’re an IT security professional, mastering mystifying termino...
TMC recognized Concentric with a Cloud Computing Excellence Award based o...
When was the last time your job dealt you a good kick in the teeth? If yo...
I’ve been thinking about zero-trust and least-privileges access lat...
I’m writing this from home in the midst of a multi-week shelter-in-plac...
Today I’m pleased to announce the availability of Concentric MIND, the ...
1. Our attitude and work ethic is everything What separates us is our att...
Risk is on my mind right now. That will surprise exactly no one: running ...
Over the last 2 months, we have been writing about what remote work means to data security. You can find some of those posts here
No one’s sure how long social distancing will last – but experts ...
Security policies don’t appear out of thin air. They develop over time,...
I never miss an opportunity to learn something new from a customer – so...
We were on the ground at Synapse, Segment’s third annual user conferenc...