Blog
Our expert views on data security and data privacy issues.
Our expert views on data security and data privacy issues.
.png)
Enable Data Security Posture Management (DSPM) for Your Entire Data Estate
October 8, 2025

Why ROT Data Must be Effectively Managed: Definition and Best Practices
September 7, 2024

Navigating the Data Tsunami: Why Network-Centric Discovery is Crucial for Modern Enterprises
November 23, 2023

Shadow AI – The Blind Spot That’s Already Costing You
October 1, 2025

The Cyber Attack That Stalled Jaguar Land Rover: A Cautionary Tale of Hyper-Connectivity
October 15, 2025

Why Contextual Data Intelligence Is Better Together: DSPM and Security Data Lakes
June 4, 2025

Data Governance Without DSPM is Just a Policy Binder
October 8, 2025

Cloud Risks Are Soaring: How to Stay Ahead in Data Security
March 17, 2025

Enterprise DSPM Has Evolved—Here’s What That Means for You
April 3, 2025

Everything You Need to Know About Data Security Posture Management (DSPM)
February 10, 2025

5 Ways to Reduce Your Cyber Threat Attack Surface
October 29, 2024

How to Create and Implement a DSPM Program
March 3, 2025

Structured and Unstructured Data: A Simple Guide for Data Security
November 19, 2024

7 AI Trends That Will Transform Data Security in 2025
January 27, 2025

1touch.io Brings SaaS Deployment to Its Sensitive Data Intelligence Platform
January 15, 2025

Mainframe Modernization Strategies: Boosting Security and Compliance | 1touch Insights
August 8, 2024

Cloud Data Security: Best Practices for Financial Institutions
May 29, 2024

What is Data Security Posture Management?
August 20, 2024

The Ultimate Guide to Data Mapping: Basics, Terms, Best Practices, and More
September 4, 2024

The Necessity of Mainframe Data Discovery and Classification | 1touch Insights
July 8, 2024

Quebec’s Law 25: The DSAR Compliance Deadline Every Business Should Know
April 16, 2024

How Automated Data Discovery Transforms Data Management and Compliance
April 9, 2024

Cloud Migration Best Practices: Mitigating Risks and Optimizing Costs
April 24, 2024

Transparency, Compliance, and Data Protection: Adapting to New Regulations in the Financial Industry
April 30, 2024

Cyber Resilience in Action: Advanced Incident Response Strategies
March 26, 2024

Crafting an Effective Data Classification Policy for Enhanced Security and Compliance
February 21, 2024

Cyber Resilience in Action: A Two-Part Guide to Transforming Data Breach Response
March 19, 2024

Compliance Checklist: 10 Essential Questions to Prepare for Data Security Audits
February 15, 2024

Protecting Sensitive Personal Information: Steps to Ensure Data Privacy in Healthcare
April 2, 2024

My Exciting New Adventure: Why I Chose 1touch.io
November 21, 2023

How AI is Transforming Data Governance in 2023
November 7, 2023

1touch.io Sets New Standards in Data Discovery Accuracy and Throughput
November 28, 2023

Enhancing Cybersecurity with XBOMs and the Emergence of Data Bill of Materials (DBOM)
January 17, 2024

Managing the Risks of Generative AI: The Critical Role of Data Governance
October 18, 2023

CCPA 2.0 Gets Closer to Reality! But How Does it Compare to GDPR?
November 22, 2022

The Three Little Pigs is NOT a Fairy Tale
February 8, 2021

IBM and 1touch.io announce a breakthrough solution to increase value for GDP customers with IBM Secu
October 25, 2022

Tokenization — Is it the Right Strategy to Protect Your PII?
January 14, 2021

Sensitive Data Discovery: The 1touch.io Inventa Way
November 22, 2022

Healthcare Data: Privacy and Utility for Regulation
November 22, 2022

Top Data Security Challenges In The Insurance Industry
February 27, 2023

Sensitive Data Discovery and Classification Explained
September 28, 2021

IBM Security Discover and Classify: A New Era in the IBM Security and 1touch.io Partnership
November 2, 2021

On-Demand: Fearless with Zero Trust – Data Discovery and Classification for Privacy and Security
November 22, 2022

Demystifying Proposition 24 (CPRA/CCPA 2.0)
November 22, 2022

The Zero Trust model might be the right approach.eBook: Zero Trust for Sustainable Data Discovery
November 22, 2022

1touch.io Inventa 3.3 Release
March 10, 2023
Prepare for Your Data Discovery Journey and Gain Sensitive Data Intelligence!
January 8, 2023

1touch.io Inventa 3.4 Release
May 9, 2023

Dude, Where’s My Encryption?
March 23, 2023

Unpacking Sensitive Data Intelligence: The Cornerstone of Proactive Data-Centric Security
October 6, 2023

Subrogation: What Basketball taught me about 3rd party risk
March 16, 2023

What do you really inherit in an acquisition?
May 24, 2023

PII Data Vulnerability Management in Today’s Hybrid Work Landscape
October 13, 2023

The Essential Steps for Secure Third-Party Data Sharing: A Practical Guide for Security Architects
June 13, 2023

1touch.io Inventa 3.5 Release!
June 6, 2023

Sensitive Data Intelligence: The Future of Cybersecurity
June 28, 2023

Safeguarding Sensitive Data: Uncovering the Top Ten Security Challenges in the Hospitality Industry
July 6, 2023

Enhancing Enterprise Security: Attack Surface Reduction and Data Minimization Strategies
July 19, 2023

Addressing Data Security and Governance in the Age of Generative AI
July 26, 2023

The Shift-Left Approach to Data Protection
August 9, 2023

Mastering the New SEC Cybersecurity Disclosure Rule
August 2, 2023

Proactive Data Security in Hospitality and Travel: A CISO’s Playbook—Part 3
August 30, 2023

Data Security in Hospitality and Travel: A CISO’s Playbook—Part 1
August 16, 2023

Third-Party Data Risks in Hospitality and Travel: A CISO’s Playbook—Part 2
August 23, 2023

Keeping Up with Ever-Changing Privacy Regulations
October 1, 2020

PII Data Vulnerability Management in the Hybrid Work Model
October 25, 2021

4 Ways Mishandling Sensitive Data Wastes Your Time
October 13, 2021

Strategies for Accurate Unstructured Data Discovery
December 13, 2023
Dear CISO: Where to Look for Personal Data
January 24, 2019
Privacy Shield Does NOT Equal GDPR Compliance
December 10, 2018
C is For Cookie and Compliance
June 15, 2019
It’s Your Right. Do it Right.
February 11, 2019
1touch.io + Anjuna: Next-Gen Solutions to Enduring Problems
April 20, 2023
Does ISO 27001 Certification Give You Immunity From GDPR Fines?
December 26, 2018
Dear CISO: Partial Inventory is No Inventory at All
February 4, 2019
Returning Control of Our Personal Data – Hurrah for CCPA
December 10, 2018
Discovery. Discovery. Discovery. The Rest is Salad Dressing.
December 10, 2018
Seeing is Believing
December 10, 2018
Data Privacy Detective Podcast Episode 32 – Discovering Personal Data: How the Unknown Becomes Known
March 19, 2019
Part 1: Introduction and Resources of the Data Breach
July 31, 2019
Digital Guardian: Overcoming Common Pitfalls to Data Discovery and Classification
June 6, 2019
The Evolving Levels of Effort
February 18, 2019
The U.S. and Europe are Approaching GDPR and Data Privacy Very Differently
May 8, 2019
Part 1: On the Convergence of Data Privacy and Data Security
November 26, 2019
A Controlled and Happy Family
June 22, 2019
Dear CISO: Who is Responsible for the Privacy of Data Subjects?
June 24, 2019
Are Enterprise and Consumer Interests Aligned?
April 15, 2019
Keeping it Private for the Good of the Company
February 21, 2019
GDPR Weekly Podcast – 1touch.io
July 10, 2019
Part 2: Standard Ways to De-Identify Personal Data
July 31, 2019
Making Your Customer the Hero
March 9, 2020
Google Maps and PII Repositories
March 4, 2020
The Privacy Regulations Shift
February 11, 2020
Part 3: Machine Learning Ways to De-Identify Personal Data (Homomorphic Encryption)
July 31, 2019
PI and Working From Home — Don’t Betray Your Customers’ Trust
May 11, 2020
High-Level Overview of 1touch.io’s Inventa
March 17, 2020
Part 4: Standard Ways to Process Datasets with QI Values
July 31, 2019
The Who, Why and What’s in It for Them of Successful
March 17, 2020
1touch.io’s Inventa and Regulatory Compliance CCPA
March 17, 2020