The AI Revolution in Personal Data Discovery and Protection

Cole PrudenArtificial Intelligence, Personal Data

The AI Revolution in Personal Data Discovery and Protection

Did somebody say AI? The world is currently experiencing a revolution of new and (slightly) worrying technology. With different implications in every field, how are personal data discovery and protection currently evolving? The Revolution Is Now Artificial intelligence, machine learning, ChatGPT, Stable Diffusion… good luck even spending five minutes online without being bombarded by these topics on every podcast, article, … Read More

Take Control of Your Personal Data in 2023

Cole PrudenData Breaches, Personal Data, Private Data

Take Control of Your Personal Data in 2023

No matter where you go online, every company tries to get its hands on your personal data. Facebook, Google, Netflix, your bank, university, pharmacy, real estate agency… everybody. 2023 is the year to regain control of your private data, so let’s explore three ways how you can do it. The New Commodity By now, we’re all too familiar with FAANG … Read More

Scanning Office 365 for sensitive PII information

Radim ŘehůřekPersonal Data, Security

Scanning Office 365 for sensitive PII information

Discover personal & sensitive data inside Office 365 accounts and remediate it. This includes both structured and unstructured data in Microsoft OneDrive, Microsoft Exchange Online, and Sharepoint Online. What does “support Office 365” mean? With PII Tools, you directly find, review, and remediate personal and sensitive information in documents, emails, and tables shared within your company’s Office 365 accounts. No … Read More

How to Identify Personal Data in the 21st Century

Cole PrudenData Discovery, Personal Data, Sensitive Information

How to Identify Personal Data in the 21st Century

Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More

Learning the Difference Between Data Privacy and Data Security

Martin JanoušekData Privacy Regulations, Personal Data, Personal Data Protection

Learning the Difference Between Data Privacy and Data Security

Companies often believe that by securing their sensitive data, they automatically comply with the requirements of various data privacy regulations (GDPR, HIPAA, CCPA, etc.). Unfortunately, this is not the case. Let’s take a look at these two terms to understand the difference and make sure you adhere to both. It’s a bad habit to treat data security and data privacy … Read More

What Are Sensitive Data Discovery Tools and How Do They Work?

Cole PrudenData Discovery, Personal Data, Real-Time Automation

What Are Sensitive Data Discovery Tools and How Do They Work?

With technology progressing and changing every day, it can sometimes be difficult to keep up with the times. As a business, however, falling behind can mean letting important (and legally binding) information fall through the cracks, disappointing customers and losing the trust of business partners. This is where sensitive data discovery tools come into play. But what exactly are they … Read More

Detect person names in text: Part 2 (Technical)

Jan ProcházkaDeep Learning, Personal Data, Whitepaper

Detect person names in text: Part 2 (Technical)

In Detect Person Names in Text: Part 1 (Results), we benchmarked our new named entity recognizer (NER) against popular open source alternatives, such as Stanford NER, Stanza and SpaCy. Today we dig a little deeper into the NER architecture and technical details. First, recall our main NER objectives. In short, we require our NER to be practical, rather than just … Read More