• All
  • AI/Deep Learning
  • Data Classification
  • Data Discovery
  • Data Security
  • Insider
  • Risk Management

The Four Horsemen of the Ransomware Apocalypse

In the New Testament, the Four Horsemen are punishments from God, and their arrival signals the end times. Ransomware victims, facing cyber adversaries who take …

Employee data management

Most of an organization’s assets are not in a constant state of change. Buildings, products, brands – they’re all likely to be around for years. …

Data Privacy Solutions: Company Nurse Case Study

Our good friends and customers over at Company Nurse were recently featured in Upside. We’re proud to have been a part of their journey – …

To Zoom or not to Zoom – one company considers cybersecurity

Concentric’s spending plenty of time on Zoom right now. We’re doing everything from formal, scheduled meetings to quick check-ins to Friday lunches on the platform …

A Numbers Story: Cloud, Collaboration & Content Redefine Data Security

There is a tectonic shift in the data security space caused by three major forces- Cloud, Collaboration and Content Variety. However, gauging the accurate scale …

Avoid the Red Queen Effect in Data Access Governance

In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find themselves running in a landscape that’s running with them. A surprised Alice says that, …