Advisory


14 Jul
Best practices for file sharing
Category: Advisory, Blog, File Sharing
Keeping in control when it comes to file sharing is high on the agenda for many enterprises. Limiting data sprawl lowers the chances of a data breach (whether intentional or accide...
17 Jun
How to contain Enterprise Data
Category: Advisory, Blog, File Sharing
If not monitored or controlled, data access and sharing will spiral endlessly within (and outside of) an organisation. Many enterprises have lost visibility of who has access to wh...
20 May
How Torsion can improve Data Access Security in Cloud Migrations
Category: Advisory, Blog, Data access, File Sh...
Every time an organisation moves an application to the cloud, or deploys more data into the cloud, any potential vulnerabilities need to be managed before, during and after the pro...
06 May
AI Data Investments Paying Off
Category: Advisory, Blog, Data access, Data Go...
According to a Progress Report on the State of Corporate Data Initiatives by NVP 92.1% of companies say they are achieving returns on their data and AI investments, a strong increa...
20 Apr
The role of the Chief Data Officer
Category: Advisory, Blog, Data access, Data Go...
In a world of growing data and cloud capabilities, a Chief Data Officer is an increasingly popular role within companies of all sizes. The chief data officer (CDO) is broadly respo...
25 Mar
The importance of a Cyber Security Culture
Category: Advisory, Blog, Data access, Insider...
When it comes to cyber security, there can be a tendency to focus solely on the technical aspects. Quite often, the needs and engagement of staff when implementing cyber security m...
10 Mar
How does your Board deal with Cybersecurity?
Category: Advisory, Blog
Research just published in Harvard Business Review has given an insight into how boards deal with cybersecurity. They found that only 68% said cybersecurity was discussed by the bo...
04 Mar
4 Ways to Ensure Data Access Compliance
Category: Advisory, Blog, Compliance
Proving you’re compliant when it comes to Data Access Governance and Management can often lead to a mad rush before the auditors arrive, ensuring you have all the necessary p...