Refreshed and updated January 7th, 2026. In a dramatically short period, ...
Refreshed and updated January 7th, 2026. Data security management used to...
Concentric AI has turned the page on 2025, and what a year of growth and ...
For years, cybersecurity guidance in the defense supply chain left some r...
For years, companies poured time and money into shoring up the usual susp...
Modern work no longer runs on databases. Today, it’s all about document...
Claude has quietly become the go-to assistant for people who want all the...
It took us decades to come up with the right tools and strategies to secu...
Europe’s General Data Protection Regulation (GDPR) and California’s C...
GenAI has gone from “interesting experiment” to “embedded in every ...
This article was refreshed and updated on November 14th, 2025. Data secur...
Every enterprise will experience a breach sooner or later, but what matte...
Article was refreshed and updated on Nov 5th, 2025. The challenges of pre...
Article was refreshed and updated on Nov 5th, 2025. The European Union...
Article was refreshed and updated on Nov 5th, 2025. Customer Relationship...
Few environments match the scale and scrutiny of federal IT. Every agency...
How to Handle Data Subject Access Requests with Confidence and Automation...
Sensitive information has never been more vulnerable, or more misundersto...
When it comes to corporate accountability, the Sarbanes-Oxley Act is one ...
Every October, Cybersecurity Awareness Month kicks off with all the usual...
Refreshed and updated on September 25th, 2025. You’ve used ChatGPT and ...
Generative AI (GenAI) didn’t wait for an invitation into the enterprise...
Businesses are swimming in data. Eight years ago, the average company m...
Data never stands still. Every second, it’s moving — across devices, ...
Refreshed and updated September 10th, 2025. When we think about digital t...
Refreshed and updated September 10th, 2025. Businesses aren’t drowning ...
Refreshed and updated September 10th, 2025. For the modern organization, ...
It didn’t take long, but heavy Generative AI (GenAI) use in the enterpr...
Generative AI is great until someone pastes confidential data into a publ...
Article updated and refreshed 7/29/25. As the transformation towards digi...
Updated and refreshed on 7/29/25. If you’re keeping up with any of the ...
Note: this article has been updated & refreshed as of 7/25/2025 As cl...
When Madhu and I started Concentric AI, we took dead aim at what we saw a...
As unstructured data sprawls across today’s ecosystem (cloud, on-prem, ...
Article refreshed June 17, 2025. As the cybersecurity landscape evolves i...
Despite increased awareness and quality of defenses, ransomware continues...
AI is eating the enterprise. Today, customer service chatbots and generat...
Being a CISO today is a balancing act of strategic leadership, financial ...
As financial institutions race to keep up with digital transformation, th...
If you’re serious about protecting your sensitive data, you need a data...
As organizations embrace the transformative potential of AI—from genera...
Your data doesn’t politely announce when it’s expired. It lingers, co...
I was at RSA last week—along with thousands of other security practitio...
When we think about data protection and security, it seems obvious that i...
Data loss prevention (DLP) was supposed to be the savior of enterprise da...
Let’s talk about data classification. We know, it sounds as exciting as...
With more sensitive data to manage and protect than ever, the more tools ...
Not long ago, it was only large businesses like enterprises that were man...
As cloud computing adoption skyrockets, companies are grappling with the ...
Massive cloud migration and digital transformation are inarguably great f...
Data privacy has never really been just a Western concern. With the rise ...
Note: this article has been updated & refreshed as of 2/25/2025 In th...
Data is like the currency that drives business. It also drives innovation...
Artificial intelligence (AI) has achieved remarkable advancements over th...
While the shift to remote and hybrid work has opened up a world of opport...
As 2024 comes to a close, the proverb – the days are long, the years ar...
Have you ever considered the invisible barriers that exist within your or...
Note: this article was updated and refreshed on November 3rd, 2024 When i...
When we started Concentric AI five years ago, it was obvious that enterpr...
AI tools like Microsoft Copilot are here to stay. Despite the security ri...
Mergers and acquisitions (M&A) play a crucial role in the growth and ...
In today’s digital and cloud-first business environment, understanding ...
The International Organization for Standardization (ISO) and the Internat...
As digital transformation and cloud migration become more commonplace in ...
As artificial intelligence continues to dominate discussions about its ro...
Cloud computing has revolutionized the business landscape and is now prac...
Knowing where all your data resides is like playing a game of hide and se...
For organizations today, achieving robust data governance, compliance, an...
With massive cloud migration and more data to manage than ever, protectin...
Cloud computing has revolutionized the way organizations store, process a...
As the healthcare industry continues to make strides in digital transform...
What is the NIST Cybersecurity Framework? What you need to know The NIST ...
With massive cloud migration and more data being stored and collected tha...
The Payment Card Industry Data Security Standard (PCI DSS) is a globally ...
Modern enterprises struggle with massive growth in data, often exponent...
It’s time again to talk about ransomware. We know it’s still happenin...
What is Data Detection and Response? Data Detection and Response (DDR) is...
Cyberattacks targeted at big-name businesses may take up most of the head...
In a business landscape where cloud migration is the norm and and the lik...
In a business landscape dominated by rapid digital transformation and AI ...
As data security moves up the priority list of almost every boardroom, pi...
Not long ago, only a small number of businesses and industries were conce...
If you’re in charge of protecting sensitive data, you know that the imp...
The landscape of data privacy is evolving faster than companies can keep ...
As cloud technology becomes a centerpiece of business operations across a...
As 2023 comes to a close, I can’t help but reflect on the convergence o...
Organizations face a trifecta of challenges when it comes to protecting d...
Not long ago, the term data privacy was considered a buzzword. Today, dat...
The U.S. Securities and Exchange Commission (SEC) has recently introduced...
The AI Executive Order, signed by President Biden on October 30, 2023, ma...
To meet the demands of massive cloud migration and digital transformation...
As cloud migration and digital transformation continue influencing IT ope...
It seems like it happens almost every day: a confidential data breach ap...
As businesses continue migrating to the cloud in monumental numbers, the ...
The Financial Conduct Authority (FCA) and the Prudential Regulation Autho...
We are excited to announce that Concentric AI has been recognized as one ...
Modern enterprises face a daunting challenge: managing the explosive grow...
Data is becoming the backbone of the modern organization. Today, business...
The shift towards a global business landscape combined with massive cloud...
What are the AFM and DNB? The Dutch Authority for the Financial Markets (...
The European Banking Authority (EBA) released the Final Report on the Gui...
For the modern organization, data protection has evolved into a complex a...
In today’s data-driven business landscape that has fueled massive c...
Organizational data is everywhere: in the cloud, on premises, structured,...
As the shift towards digital and cloud-based solutions accelerates, data ...
What is the SEC Rule SEC 17a-4 SEC Rule 17a-4 is a regulation issued by t...
The Forrester Sensitive Data Discovery and Classification report discusse...
What is the UK Data Protection Act 2018? The Data Protection Act 2018 is ...
The 2023 Gartner report, Innovation Insight: Data Security Posture Manage...
The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services M...
What is the FINRA rule? The Financial Industry Regulatory Authority (FINR...
The Commodity Futures Trading Commission (CFTC) Rule 1.31(c-d) is a U.S. ...
The California Privacy Rights Act (CPRA) is a recent piece of privacy leg...
What is HITRUST? HITRUST, the Health Information Trust Alliance, is a com...
Concentric and other vendors such as Varonis and Netwrix are some of the ...
Businesses are obligated to protect sensitive data not just for the secur...
Today’s threat landscape produces a harsh reality: for organizations, a...
Modern cloud solutions and pervasive network connectivity have democratiz...
Reports of data breaches in the news are seemingly endless, as enterprise...
Applications and solutions that leverage deep learning and AI are prolife...
With massive data and cloud migration growth, collaboration and sharing h...
Data is one of an organization’s most valuable assets. But the defini...
Concentric AI Included in Newly Created Data Security Posture Management ...
Today I’m proud to announce that Concentric has closed our series A rou...
As soldiers in the fight against cybercrime, Concentric understands how p...
Innovation, Relevance, Focus
This eye-opening discussion reveals the practical realities Henry Mayorga...
We are now a part of the Box Technology Partner program! We’ve int...
Almost every IT project must, at some point, run the financial justificat...
In the New Testament, the Four Horsemen are punishments from God, and the...
Most of an organization’s assets are not in a constant state of change....
Read as Henry Svendblad, Company Nurse CIO, describes the journey to data security in his own words.
Concentric’s spending plenty of time on Zoom right now. We’re doing e...
There is a tectonic shift in the data security space caused by three majo...
In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find t...
This article originally appeared in Campus Security & Life Safety
Because I am both a cheapskate and own some screwdrivers, I’ve repair...
Originally published in Security Boulevard
On March 31st, Alejandro Mayorkas, Secretary of Homeland Security, gave a...
Once again, Concentric notched another industry award win with BIG’...
A couple of days ago, we learned Concentric is one of SC Magazine’s...
This article originally appeared in AI Journal. Few incidents encapsulate...
I recently had a chance to sit down with Dave Marshall over at VMBlog to...
Today I’m pleased to announce the availability of two critical new ...
A customer in upstate New York, returning a copy of “The General’s Da...
I recently had the opportunity to share my thoughts about what 2021 might...
“This could have had a massive, massive amount of money stolen from peo...
I recently wrote an article about how a distributed workforce and work fr...
What to expect in 2021? How the pandemic plays out will have a huge say o...
We hosted our first webinar June 23 2020 and were glad to have Featured S...
AI is the new buzzword in today’s cybersecurity market place of product...
According to industry reports, there will be an 800% increase in enterprise data, and about 80% of it will be unstructured data.
GDPR and CCPA are data privacy regulations that are redefining how busine...
Right to be Forgotten (RTBF) derives from a famous court case against Goo...
It is common knowledge that data security teams must have a proactive pla...
Managing Risk More Effectively with FAIR
We’re proud to be a part of the Company Nurse story. By helping them fi...
According to a recent survey of cybersecurity experts in “The CISO ...
This article originally appeared in Forbes.
I recently had the chance to sit down with Aviva Zacks from SafetyDetecti...
Byron Acohido’s The Last Watchdog blog is one of the best combinati...
Dwight Eisenhower’s decision framework famously categorizes tasks based...
Since approximately last March, SolarWinds software updates have included...
If you’re an IT security professional, mastering mystifying termino...
TMC recognized Concentric with a Cloud Computing Excellence Award based o...
When was the last time your job dealt you a good kick in the teeth? If yo...
I’ve been thinking about zero-trust and least-privileges access lat...
I recently had the opportunity to weigh in on the topic of ethics in AI. ...
I’m writing this from home in the midst of a multi-week shelter-in-plac...
Today I’m pleased to announce the availability of Concentric MIND, the ...
I’m proud to announce Concentric was named one of CRN’s Emerg...
1. Our attitude and work ethic is everything What separates us is our att...
Risk is on my mind right now. That will surprise exactly no one: running ...
Over the last 2 months, we have been writing about what remote work means to data security. You can find some of those posts here
Yesterday Twitter appointed Fei-Fei Li to their board of directors. Dr. L...
No one’s sure how long social distancing will last – but experts ...
Security policies don’t appear out of thin air. They develop over time,...
I never miss an opportunity to learn something new from a customer – so...
We were on the ground at Synapse, Segment’s third annual user conferenc...