Blog


13 May
How to achieve Zero Trust Data Access Governance
Category: Blog, Compliance, Data access, Insid...
Zero Trust has recently become a key buzzword in cybersecurity. When it comes to preventing data breaches and securing your data access, a Zero Trust model is really worth consider...
21 Apr
Homeworking data breaches drive security changes
Category: Advisory, Blog, File Sharing, Inside...
08 Apr
Recording the ‘why’ for data access governance
Category: Advisory, Blog, Compliance, Data acc...
When it comes to proving to auditors that you are in control of your Data Access Governance, it’s just as important to record ‘why’ somebody has access to a parti...
01 Apr
Attribute Based Access Control
Category: Advisory, Blog, Data access
There are two main ways of controlling the authentication of who has access to what within an organisaion: Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC...
25 Mar
How to get control of external sharing
Category: Blog, Data access, File Sharing
18 Mar
It’s time to democratise your data
Category: Advisory, Blog, File Sharing
Democratise (verb) – to make organisations use democratic ways of making decisions If you want to make a good decision about who should have access to a piece of information,...
10 Mar
Do you have data blind spots?
Category: Advisory, Blog, Data access, Insider...
According to a new report by Cloudsphere (In the Dark: Why Enterprise Blind Spots are Leaving Sensitive Enterprise Data Vulnerable to Breaches) 32% of enterprises experienced unaut...
03 Mar
Torsion and the Microsoft 365 stack
Category: Advisory, Blog, Data Governance
We are regularly asked how Torsion works with the Microsoft 365 stack. What value does it add? What does it do that Microsoft doesn’t already do? Well, among the tools for da...
23 Feb
Data Access Governance: Revoking data access
Category: Advisory, Blog, Data access
Within an organisation, people naturally change jobs and roles and of course the businesses itself evolves. But as this happens it’s really difficult to stay on top of file a...
17 Feb
The Who, What, When and Why of Data Access Governance
Category: Advisory, Blog, Data access, Data Go...
When it comes to Data Access Governance and proving to auditors that you are in control of your data access and sharing, you have to demonstrate the ‘who’, ‘when&...