Blog
Your data doesn’t politely announce when it’s expired. It lingers, co...
Blog
Data security management used to be a behind-the-scenes task, handled qui...
Blog
I was at RSA last week—along with thousands of other security practitio...
Blog
When we think about data protection and security, it seems obvious that i...
Blog
Data loss prevention (DLP) was supposed to be the savior of enterprise da...
Blog
Let’s talk about data classification. We know, it sounds as exciting as...
Blog
With more sensitive data to manage and protect than ever, the more tools ...
Data is the backbone of the modern organization. Today, organizations gen...
Blog
Not long ago, it was only large businesses like enterprises that were man...
As cloud computing adoption skyrockets, companies are grappling with the ...
Blog
Customer Relationship Management (CRM) systems like Salesforce are critic...
Blog
Massive cloud migration and digital transformation are inarguably great f...
Blog
Data privacy has never really been just a Western concern. With the rise ...
Blog
Given the increasing frequency of cyber threats and the need for stronger...
Blog
Data is like the currency that drives business. It also drives innovation...
Blog
Artificial intelligence (AI) has achieved remarkable advancements over th...
Blog
While the shift to remote and hybrid work has opened up a world of opport...
Blog
Despite increased awareness and quality of defenses, ransomware continues...
Blog
As the transformation towards digital and cloud-first thinking continues ...
Blog
The challenges of preventing data breaches and managing unauthorized acce...
Blog
If you’re keeping up with any of the data security trends, you already ...
Blog
As 2024 comes to a close, the proverb – the days are long, the years ar...
Blog
Have you ever considered the invisible barriers that exist within your or...
Blog
Note: this article has been updated & refreshed as of 2/25/2025 For t...
Blog
As financial institutions race to keep up with digital transformation, th...
Blog
Businesses today are processing more data than the mind can even comprehe...
Blog
Data Security Governance is essential for managing and protecting sensiti...
Blog
Note: this article was updated and refreshed as of 11/15/24. If you’ve ...
Blog
Note: this article was updated and refreshed on November 3rd, 2024 When i...
When we started Concentric AI five years ago, it was obvious that enterpr...
Blog
What is the Sarbanes-Oxley (SOX) act? The Sarbanes-Oxley Act (SOX) of 200...
AI tools like Microsoft Copilot are here to stay. Despite the security ri...
Mergers and acquisitions (M&A) play a crucial role in the growth and ...
In today’s digital and cloud-first business environment, understanding ...
Blog
The International Organization for Standardization (ISO) and the Internat...
Blog
As digital transformation and cloud migration become more commonplace in ...
Blog
As the cybersecurity landscape reaches new levels of complexity seemingly...
Blog
The European Union’s Artificial Intelligence Act (EU AI Act) is a n...
Blog
As artificial intelligence continues to dominate discussions about its ro...
Blog
Cloud computing has revolutionized the business landscape and is now prac...
Blog
Knowing where all your data resides is like playing a game of hide and se...
Blog
For organizations today, achieving robust data governance, compliance, an...
Note: this article has been updated and refreshed as of 2/27/25 As the cy...
Blog
With massive cloud migration and more data to manage than ever, protectin...
Blog
Cloud computing has revolutionized the way organizations store, process a...
Blog
As the healthcare industry continues to make strides in digital transform...
Blog
What is the NIST Cybersecurity Framework? What you need to know The NIST ...
Blog
With massive cloud migration and more data being stored and collected tha...
Blog
The Payment Card Industry Data Security Standard (PCI DSS) is a globally ...
Blog
GDPR and CCPA are significant data protection legislations that require b...
Blog
 Modern enterprises struggle with massive growth in data, often exponent...
It’s time again to talk about ransomware. We know it’s still happenin...
Blog
When we think about digital transformation and massive migration to the c...
Blog
What is Data Detection and Response? Data Detection and Response (DDR) is...
Blog
Cyberattacks targeted at big-name businesses may take up most of the head...
Blog
In a business landscape where cloud migration is the norm and and the lik...
Blog
Digital transformation is everywhere, and has practically reached ubiquit...
Blog
In a business landscape dominated by rapid digital transformation and AI ...
Blog
As data security moves up the priority list of almost every boardroom, pi...
Blog
Note: this article has been updated & refreshed as of 2/27/2025 As cl...
Blog
Not long ago, only a small number of businesses and industries were conce...
Blog
If you’re in charge of protecting sensitive data, you know that the imp...
Blog
The landscape of data privacy is evolving faster than companies can keep ...
Blog
As cloud technology becomes a centerpiece of business operations across a...
Blog
As 2023 comes to a close, I can’t help but reflect on the convergence o...
Blog
Organizations face a trifecta of challenges when it comes to protecting d...
Blog
Not long ago, the term data privacy was considered a buzzword. Today, dat...
Blog
The U.S. Securities and Exchange Commission (SEC) has recently introduced...
Blog
The AI Executive Order, signed by President Biden on October 30, 2023, ma...
Blog
To meet the demands of massive cloud migration and digital transformation...
Blog
As cloud migration and digital transformation continue influencing IT ope...
Blog
It seems like it happens almost every day: a confidential data breach ap...
Blog
In today’s business landscape, in which data is proliferating at an unp...
Blog
As businesses continue migrating to the cloud in monumental numbers, the ...
Blog
The Financial Conduct Authority (FCA) and the Prudential Regulation Autho...
Blog
We are excited to announce that Concentric AI has been recognized as one ...
Blog
Modern enterprises face a daunting challenge: managing the explosive grow...
Blog
Data is becoming the backbone of the modern organization. Today, business...
Blog
The shift towards a global business landscape combined with massive cloud...
Blog
What are the AFM and DNB? The Dutch Authority for the Financial Markets (...
Blog
The European Banking Authority (EBA) released the Final Report on the Gui...
Blog
For the modern organization, data protection has evolved into a complex a...
Blog
In today’s data-driven business landscape that has fueled massive c...
Blog
Organizational data is everywhere: in the cloud, on premises, structured,...
Blog
As the shift towards digital and cloud-based solutions accelerates, data ...
Blog
What is the SEC Rule SEC 17a-4 SEC Rule 17a-4 is a regulation issued by t...
Blog
The Forrester Sensitive Data Discovery and Classification report discusse...
Blog
What is the UK Data Protection Act 2018? The Data Protection Act 2018 is ...
Blog
The 2023 Gartner report, Innovation Insight: Data Security Posture Manage...
Blog
The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services M...
Blog
What is the FINRA rule? The Financial Industry Regulatory Authority (FINR...
Blog
The Commodity Futures Trading Commission (CFTC) Rule 1.31(c-d) is a U.S. ...
Blog
The California Privacy Rights Act (CPRA) is a recent piece of privacy leg...
Blog
What is HITRUST? HITRUST, the Health Information Trust Alliance, is a com...
Blog
Concentric and other vendors such as Varonis and Netwrix are some of the ...
Blog
Businesses are obligated to protect sensitive data not just for the secur...
Blog
Note: this article has been updated & refreshed as of 2/25/2025 In th...
Blog
Today’s threat landscape produces a harsh reality: for organizations, a...
Blog
Modern cloud solutions and pervasive network connectivity have democratiz...
Blog
Reports of data breaches in the news are seemingly endless, as enterprise...
Blog
Applications and solutions that leverage deep learning and AI are prolife...
Blog
With massive data and cloud migration growth, collaboration and sharing h...
Blog
Data is one of an organization’s most valuable assets. But the defini...
Blog
Concentric AI Included in Newly Created Data Security Posture Management ...
Blog
Today I’m proud to announce that Concentric has closed our series A rou...
Blog
As soldiers in the fight against cybercrime, Concentric understands how p...
Blog
Innovation, Relevance, Focus
Blog
This eye-opening discussion reveals the practical realities Henry Mayorga...
Blog
We are now a part of the Box Technology Partner program! We’ve int...
Blog
Almost every IT project must, at some point, run the financial justificat...
Blog
In the New Testament, the Four Horsemen are punishments from God, and the...
Blog
Most of an organization’s assets are not in a constant state of change....
Blog
Read as Henry Svendblad, Company Nurse CIO, describes the journey to data security in his own words.
Blog
Concentric’s spending plenty of time on Zoom right now. We’re doing e...
Blog
There is a tectonic shift in the data security space caused by three majo...
Blog
In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find t...
Blog
This article originally appeared in Campus Security & Life Safety
Blog
Because I am both a cheapskate and own some screwdrivers, I’ve repair...
Blog
Originally published in Security Boulevard
Blog
On March 31st, Alejandro Mayorkas, Secretary of Homeland Security, gave a...
Blog
Once again, Concentric notched another industry award win with BIG’...
Blog
A couple of days ago, we learned Concentric is one of SC Magazine’s...
Blog
This article originally appeared in AI Journal. Few incidents encapsulate...
Blog
I recently had a chance to sit down with Dave Marshall over at VMBlog to...
Blog
Today I’m pleased to announce the availability of two critical new ...
Blog
A customer in upstate New York, returning a copy of “The General’s Da...
Blog
I recently had the opportunity to share my thoughts about what 2021 might...
Blog
“This could have had a massive, massive amount of money stolen from peo...
Blog
I recently wrote an article about how a distributed workforce and work fr...
Blog
What to expect in 2021? How the pandemic plays out will have a huge say o...
Blog
We hosted our first webinar June 23 2020 and were glad to have Featured S...
Blog
AI is the new buzzword in today’s cybersecurity market place of product...
Blog
According to industry reports, there will be an 800% increase in enterprise data, and about 80% of it will be unstructured data.
Blog
GDPR and CCPA are data privacy regulations that are redefining how busine...
Blog
Right to be Forgotten (RTBF) derives from a famous court case against Goo...
Blog
It is common knowledge that data security teams must have a proactive pla...
Blog
Managing Risk More Effectively with FAIR
Blog
We’re proud to be a part of the Company Nurse story. By helping them fi...
Blog
According to a recent survey of cybersecurity experts in “The CISO ...
Blog
This article originally appeared in Forbes.
Blog
I recently had the chance to sit down with Aviva Zacks from SafetyDetecti...
Blog
Byron Acohido’s The Last Watchdog blog is one of the best combinati...
Blog
Dwight Eisenhower’s decision framework famously categorizes tasks based...
Blog
Since approximately last March, SolarWinds software updates have included...
Blog
If you’re an IT security professional, mastering mystifying termino...
Blog
TMC recognized Concentric with a Cloud Computing Excellence Award based o...
Blog
When was the last time your job dealt you a good kick in the teeth? If yo...
Blog
I’ve been thinking about zero-trust and least-privileges access lat...
Blog
I recently had the opportunity to weigh in on the topic of ethics in AI. ...
Blog
I’m writing this from home in the midst of a multi-week shelter-in-plac...
Blog
Today I’m pleased to announce the availability of Concentric MIND, the ...
Blog
I’m proud to announce Concentric was named one of CRN’s Emerg...
Blog
1. Our attitude and work ethic is everything What separates us is our att...
Risk is on my mind right now. That will surprise exactly no one: running ...
Blog
Over the last 2 months, we have been writing about what remote work means to data security. You can find some of those posts here
Blog
Yesterday Twitter appointed Fei-Fei Li to their board of directors. Dr. L...
Blog
No one’s sure how long social distancing will last – but experts ...
Blog
Security policies don’t appear out of thin air. They develop over time,...
Blog
I never miss an opportunity to learn something new from a customer – so...
Blog
We were on the ground at Synapse, Segment’s third annual user conferenc...