Deepak JhaMar 13, 20232 minHow Organizations Can Execute an Effective PAM Strategy?Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an...
Deepak JhaMar 13, 20235 minGDPRData Subject Rights and its Exercise Under GDPRData subject rights has been a major point of discussion with the onset of GDPR. However, the concept is not new and can be traced back...
Deepak JhaMar 13, 20233 minQuébec Law 25Québec Recent Privacy Development- Québec Law 25 / Bill 64On 21 September 2021, the Quebec National Assembly passed Law 25/Bill 64, An Act to modernize legislative provisions regarding the...
Deepak JhaFeb 25, 20234 minHow Sensitive Data Discovery Helps Secure PII (Personally Identifiable Information)Data discovery is the process of locating specific subsets of data from unstructured and structured data sources. It is essential to...