Data Protection Articles & Guides

A Deep Dive into Encryption Types

A Deep Dive into Encryption Types

Did you know that cryptography will play a fundamental role in the current digital era?. Explore here the complex world of cryptography in our comprehensive guide. Get to know 3 different types of encryption, from Symmetric to Asymmetric, AES to RSA. Understand their...

read more
2024 Cybersecurity Trends by Expert Views

2024 Cybersecurity Trends by Expert Views

Learn the top Impactful 2024 Cybersecurity Trends from several Analyst such as Gartner, Google, Forrester, IDC and SealPath. This article gathers the forward looking thoughts and aims to help you fight cyberthreats in 2024 and be aware of the latest to improve your...

read more
Types of Sensitive Information – A complete Guide

Types of Sensitive Information – A complete Guide

Learn all you should know about sensitive information with our comprehensive guide from personal identities to high-risk data. Master the art of identifying what's sensitive with real examples and procedures. Table of contents: 1. Understanding Sensitive Information...

read more
LibreOffice Document Protection

LibreOffice Document Protection

In this blog article we show you how to encrypt and control permissions on the content in files of the LibreOffice office suite both in ODF format (.odt, .ods, etc.) as in MS-Office format (.docx, .xlsx, etc.). TABLE OF CONTENTS LibreOffice: The Open Source...

read more
3 Data Security & Privacy Trends to Know in 2023

3 Data Security & Privacy Trends to Know in 2023

In this article we echo the data security and privacy predictions in 2023 made by different market analysts. The ever-increasing personal data protection regulations in the world, the need to contain and mitigate information leaks in companies and the changes in...

read more
Who should encrypt the data in my company?

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...

read more
Predictions in the field of Data-Centric Security for 2022

Predictions in the field of Data-Centric Security for 2022

In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...

read more