Deep Dives

What is consumer data privacy?
What is Consumer Data Privacy?

Data collection is an essential tool for businesses trying to learn more about their customers' wants, needs, and pain points. It allows you to create custom marketing campaigns, personalize product and service offerings, and become a more valuable asset…

What is HIPPA Compliance?
What is HIPAA Compliance?

HIPAA, formally known as the Health Insurance Portability and Accountability Act of 1996, is a collection of rules and standards for using, managing, storing, and sharing protected health information. PHI includes personally identifiable information,…

Free Cloud Storage - Online File and Data Storage
Free Cloud Storage

As data management has gotten faster and cheaper, cloud storage has exploded. This industry is expected to keep growing for years to come. Cloud-based platforms are convenient, secure, and inexpensive (or even free). In fact, you likely already use cloud…

What is cloud migration?
What is cloud migration?

So, you've decided migrating your content to the cloud is the right move for your business. How are you going to get there? Moving content to the cloud isn't always straightforward. What really goes into migrating your content to the cloud, and how do…

What is electronic signature
What is electronic signature

Over the ages, people have used various techniques to complete transactions. In ancient times, it was common to rely on eyewitness verification or seals that kept documents firmly closed until they were delivered. By the Middle Ages, people often used…

FedRAMP Marketplace: Agency Guide
FedRAMP Marketplace: Agency Guide

The FedRAMP Marketplace is the official online repository of Cloud Service Offerings (CSOs). It provides a convenient, one-stop shop for Federal Agencies to find FedRAMP Authorized cloud services. The FedRAMP program standardizes the security…

Modern Virtual Data Rooms Explained
Modern Virtual Data Rooms Explained: How To Pick The Best VDR Provider

A virtual data room (VDR) is a secure cloud platform that enables managing and sharing of sensitive company documents. Most traditional VDR platforms focus on financial transactions such as merger and acquisitions (M&A). But modern VDRs are often much…

Information Security Lifecycle
The information security lifecycle

Across all sectors of IT, projects are often managed through a lifecycle model, where a product goes through a cycle of improvement and upkeep with no endpoint. This is true for information security as much as any other IT sector. The information…

Information Security Management
Information security management

In today’s data- and information-heavy age, it’s critical to secure your organization's valuable content, such as videos, documents, customer data, and account information. Information security management safeguards that content, protecting it from third…

How to get FedRAMP agency ATO authorization
How To Get FedRAMP Agency ATO Authorization

FedRAMPAgency Authorization to Operate (ATO) Authorization Process FedRAMP is the program for Cloud Service Providers (CSPs) to gain access and sell to Federal Agencies. By law, agencies can only buy cloud products through the FedRAMP marketplace. It is…

FedRAMP
What is FedRAMP Tailored and LI-SaaS?

FedRAMP Tailored is a relatively new streamlined process launched in August 2017. Most agencies and vendors don’t know much about this program. We’ll give a full breakdown of everything you need to know.

The Ultimate FedRAMP guide
The Ultimate FedRAMP Guide 2021

This guide goes over everything you need to know about FedRAMP. Learning the background of the program, why it exists and how to navigate it is key for both agencies and vendors. There are a lot of rules and a broad legal framework that is important to…

How to get FedRAMP JAB P-ATO
How To Get FedRAMP JAB P-ATO (Provisional Authorization to Operate)

FedRAMP is the program for Cloud Service Providers (CSPs) to gain access and sell to Federal Agencies. By law, agencies can only buy cloud products through the FedRAMP marketplace. It is very important to understand the entire framework and process…

Approaches to Information Security Implementation
Approaches to Information Security Implementation

Information security, or infosec, refers to data security —one component of a larger cybersecurity plan that takes proactive steps to protect data. Key areas of an infosec programinclude controlling who can access what data, what level of access each…

Core elements
Information security policy: Core elements

Security threats are unfortunately a routine part of doing business. In 2019, an organization fell prey to ransomware once every 14 seconds. Your company requires a rigorous, comprehensive information security policy to deal with these concerns. As you…

Information Security vs. Compliance
Information security vs. compliance

Information security and compliance are crucial to an organization's data protection and financial security. Though compliance and security are different, they both help your company manage risk. When you use them together, they can reduce threats to…

Information Security vs. Information Privacy
The difference between information security and information privacy

Information security and information privacy are increasingly high priorities for many companies. Breaches can be devastating for companies and consumers, in terms of both financial costs and business and personal disruption. More than 40 million…

The difference between cyber security and information security
The difference between cyber security and information security

You have valuable content that you want to protect from third-party attackers, hackers, and other unauthorized users. If a hacker gained access to your company's customer list, they could send those clients fake messages or use your customers' personal…

The principles and fundamentals of information security
The principles and fundamentals of information security

When you're developing an information security program for your organization, you want to protect your company's content, keeping it from unauthorized views and use while giving access to the right people. You also want to preserve your content,…

What is information security
What is information security?

Think about all the content your company needs and produces to go about its business. From budget spreadsheets to employee contracts, product brainstorming sessions to buyer personas, your business runs on information. Now, consider what would happen if…