While the shift to remote and hybrid work has opened up a world of opport...
Despite increased awareness and quality of defenses, ransomware continues...
The challenges of preventing data breaches and managing unauthorized acce...
As 2024 comes to a close, the proverb – the days are long, the years ar...
As financial institutions race to keep up with digital transformation, th...
Businesses today are processing more data than the mind can even comprehe...
Data Security Governance is essential for managing and protecting sensiti...
Note: this article was updated and refreshed as of 11/15/24. If you’ve ...
Note: this article was updated and refreshed on November 3rd, 2024 When i...
Note: this article has been updated as of 10/29/2024 For the modern organ...
When we started Concentric AI five years ago, it was obvious that enterpr...
What is the Sarbanes-Oxley (SOX) act? The Sarbanes-Oxley Act (SOX) of 200...
As cloud computing adoption skyrockets, companies are managing massive am...
AI tools like Microsoft Copilot are here to stay. Despite the security ri...
Mergers and acquisitions (M&A) play a crucial role in the growth and ...
In today’s digital and cloud-first business environment, understanding ...
The International Organization for Standardization (ISO) and the Internat...
Have you ever considered the invisible barriers that exist within your or...
As the cybersecurity landscape reaches new levels of complexity seemingly...
The European Union’s Artificial Intelligence Act (EU AI Act) is a n...
As artificial intelligence continues to dominate discussions about its ro...
Cloud computing has revolutionized the business landscape and is now prac...
Knowing where all your data resides is like playing a game of hide and se...
For organizations today, achieving robust data governance, compliance, an...
Customer Relationship Management (CRM) systems like Salesforce are critic...
Note: this article has been updated and refreshed as of 7/17/24 As the cy...
With massive cloud migration and more data to manage than ever, protectin...
Data is the backbone of the modern organization. Today, organizations gen...
Cloud computing has revolutionized the way organizations store, process a...
As the healthcare industry continues to make strides in digital transform...
What is the NIST Cybersecurity Framework? What you need to know The NIST ...
With massive cloud migration and more data being stored and collected tha...
The Payment Card Industry Data Security Standard (PCI DSS) is a globally ...
GDPR and CCPA are significant data protection legislations that require b...
 Modern enterprises struggle with massive growth in data, often exponent...
It’s time again to talk about ransomware. We know it’s still happenin...
If you spend any time reading about data security, you already know that ...
When we think about digital transformation and massive migration to the c...
What is Data Detection and Response? Data Detection and Response (DDR) is...
Cyberattacks targeted at big-name businesses may take up most of the head...
In a business landscape where cloud migration is the norm and and the lik...
Massive cloud migration and digital transformation are inarguably great f...
In today’s business landscape where digital transformation has almost r...
As the transformation towards digital and cloud continues its rapid pace,...
In a business landscape dominated by rapid digital transformation and AI ...
As data security moves up the priority list of almost every boardroom, pi...
As cloud adoption skyrockets alongside the surge in the sheer amount of d...
Not long ago, only a small number of businesses and industries were conce...
If you’re in charge of protecting sensitive data, you know that the imp...
The landscape of data privacy is evolving faster than companies can keep ...
As cloud technology becomes a centerpiece of business operations across a...
As 2023 comes to a close, I can’t help but reflect on the convergence o...
Organizations face a trifecta of challenges when it comes to protecting d...
When we think about data protection and security, it seems evident that i...
As digital transformation and cloud migration become more commonplace in ...
Not long ago, the term data privacy was considered a buzzword. Today, dat...
The U.S. Securities and Exchange Commission (SEC) has recently introduced...
The AI Executive Order, signed by President Biden on October 30, 2023, ma...
To meet the demands of massive cloud migration and digital transformation...
As cloud migration and digital transformation continue influencing IT ope...
It seems like it happens almost every day: a confidential data breach ap...
In today’s business landscape, in which data is proliferating at an unp...
As businesses continue migrating to the cloud in monumental numbers, the ...
Not long ago, it was only large businesses like enterprises that were man...
The Financial Conduct Authority (FCA) and the Prudential Regulation Autho...
We are excited to announce that Concentric AI has been recognized as one ...
Modern enterprises face a daunting challenge: managing the explosive grow...
Data is becoming the backbone of the modern organization. Today, business...
The shift towards a global business landscape combined with massive cloud...
What are the AFM and DNB? The Dutch Authority for the Financial Markets (...
The European Banking Authority (EBA) released the Final Report on the Gui...
For the modern organization, data protection has evolved into a complex a...
In today’s data-driven business landscape that has fueled massive c...
Organizational data is everywhere: in the cloud, on premises, structured,...
As the shift towards digital and cloud-based solutions accelerates, data ...
What is the SEC Rule SEC 17a-4 SEC Rule 17a-4 is a regulation issued by t...
The Forrester Sensitive Data Discovery and Classification report discusse...
What is the UK Data Protection Act 2018? The Data Protection Act 2018 is ...
The 2023 Gartner report, Innovation Insight: Data Security Posture Manage...
The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services M...
What is the FINRA rule? The Financial Industry Regulatory Authority (FINR...
The Commodity Futures Trading Commission (CFTC) Rule 1.31(c-d) is a U.S. ...
The California Privacy Rights Act (CPRA) is a recent piece of privacy leg...
What is HITRUST? HITRUST, the Health Information Trust Alliance, is a com...
Concentric and other vendors such as Varonis and Netwrix are some of the ...
Businesses are obligated to protect sensitive data not just for the secur...
In the era of big data and massive cloud migration, the importance of eff...
Today’s threat landscape produces a harsh reality: for organizations, a...
Modern cloud solutions and pervasive network connectivity have democratiz...
Reports of data breaches in the news are seemingly endless, as enterprise...
Applications and solutions that leverage deep learning and AI are prolife...
With massive data and cloud migration growth, collaboration and sharing h...
Data is one of an organization’s most valuable assets. But the defini...
Concentric AI Included in Newly Created Data Security Posture Management ...
Today I’m proud to announce that Concentric has closed our series A rou...
As soldiers in the fight against cybercrime, Concentric understands how p...
Innovation, Relevance, Focus
This eye-opening discussion reveals the practical realities Henry Mayorga...
We are now a part of the Box Technology Partner program! We’ve int...
Almost every IT project must, at some point, run the financial justificat...
In the New Testament, the Four Horsemen are punishments from God, and the...
Most of an organization’s assets are not in a constant state of change....
Read as Henry Svendblad, Company Nurse CIO, describes the journey to data security in his own words.
Concentric’s spending plenty of time on Zoom right now. We’re doing e...
There is a tectonic shift in the data security space caused by three majo...
In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find t...
This article originally appeared in Campus Security & Life Safety
Because I am both a cheapskate and own some screwdrivers, I’ve repair...
Originally published in Security Boulevard
On March 31st, Alejandro Mayorkas, Secretary of Homeland Security, gave a...
Once again, Concentric notched another industry award win with BIG’...
A couple of days ago, we learned Concentric is one of SC Magazine’s...
This article originally appeared in AI Journal. Few incidents encapsulate...
I recently had a chance to sit down with Dave Marshall over at VMBlog to...
Today I’m pleased to announce the availability of two critical new ...
A customer in upstate New York, returning a copy of “The General’s Da...
I recently had the opportunity to share my thoughts about what 2021 might...
“This could have had a massive, massive amount of money stolen from peo...
I recently wrote an article about how a distributed workforce and work fr...
What to expect in 2021? How the pandemic plays out will have a huge say o...
We hosted our first webinar June 23 2020 and were glad to have Featured S...
AI is the new buzzword in today’s cybersecurity market place of product...
According to industry reports, there will be an 800% increase in enterprise data, and about 80% of it will be unstructured data.
GDPR and CCPA are data privacy regulations that are redefining how busine...
Right to be Forgotten (RTBF) derives from a famous court case against Goo...
It is common knowledge that data security teams must have a proactive pla...
Managing Risk More Effectively with FAIR
We’re proud to be a part of the Company Nurse story. By helping them fi...
According to a recent survey of cybersecurity experts in “The CISO ...
This article originally appeared in Forbes.
I recently had the chance to sit down with Aviva Zacks from SafetyDetecti...
Byron Acohido’s The Last Watchdog blog is one of the best combinati...
Dwight Eisenhower’s decision framework famously categorizes tasks based...
Since approximately last March, SolarWinds software updates have included...
If you’re an IT security professional, mastering mystifying termino...
TMC recognized Concentric with a Cloud Computing Excellence Award based o...
When was the last time your job dealt you a good kick in the teeth? If yo...
I’ve been thinking about zero-trust and least-privileges access lat...
I recently had the opportunity to weigh in on the topic of ethics in AI. ...
I’m writing this from home in the midst of a multi-week shelter-in-plac...
Today I’m pleased to announce the availability of Concentric MIND, the ...
I’m proud to announce Concentric was named one of CRN’s Emerg...
1. Our attitude and work ethic is everything What separates us is our att...
Risk is on my mind right now. That will surprise exactly no one: running ...
Over the last 2 months, we have been writing about what remote work means to data security. You can find some of those posts here
Yesterday Twitter appointed Fei-Fei Li to their board of directors. Dr. L...
No one’s sure how long social distancing will last – but experts ...
Security policies don’t appear out of thin air. They develop over time,...
I never miss an opportunity to learn something new from a customer – so...
We were on the ground at Synapse, Segment’s third annual user conferenc...