<img src="https://ad.doubleclick.net/ddm/activity/src=11631230;type=pagevw0;cat=pw_allpg;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1;num=1?" width="1" height="1" alt="">

All Posts By

Editorial Team

Finding the Balance Between Data Sharing and Data Sovereignty - Virtru

Finding the Balance Between Data Sharing and Data Sovereignty

Not so long ago, the world’s economy was flat, and data was borderless. Currency – in the form of bits of data – was exchanged freely, across country borders, continents, and oceans. This transactional freedom powered the world’s economy.  Today, things are different. The economy is ...

Introducing OpenTDF: Open Source, Accessible Security for Developers

Introducing OpenTDF: Open Source, Accessible Security for Developers

At Virtru, we believe that the ability to securely share data is essential — and that privacy is a human right that must be protected.

Enable Data Sovereignty - Zero Trust Data Controls for Google Workspace

Enabling Data Sovereignty with Zero Trust Data Controls for Google Workspace

As more and more companies migrate to public cloud infrastructure and embrace work from anywhere operations – more and more companies are asking critical questions about data sovereignty and data control. This is especially true for European companies who must answer the following question: how ...

Maximize Your Zero Trust Identity Management by Tying Identity to Data

Maximize Your Zero Trust Identity Management by Tying Identity to Data

If you’ve started down the path of Zero Trust security, identity and access management (IAM) is likely a substantial part of your road map — and it should be. Identity management providers, such as Okta, Ping, and AuthO are focused on ensuring that people and systems accessing your network are ...

Our military protects us. Are we doing enough to protect them?

Our military protects us. Are we doing enough to protect them?

Modern warfare takes shape in many ways. Even in the past year alone, global attacks have manifested in physical, on-the-ground conflict; cyberattacks on critical infrastructure; malware and ransomware attacks to gain access to vital sensitive data; social media ...

3 Essential Components of a Strong SASE Strategy - Virtru Blog

3 Essential Components of a Strong SASE Strategy

Secure Access Service Edge (SASE) is becoming increasingly adopted in both commercial and federal organizations. In a complex technology ecosystem, a SASE strategy aims to streamline disparate systems into a common, unified framework.

Virtru Delivers Zero Trust Data Control for New Google Workspace Client-Side Encryption

Virtru Delivers Zero Trust Data Control for New Google Workspace Client-Side Encryption

Virtru has been a longtime Google partner, equipping thousands of joint customers to extend Zero Trust Data Control across the Google portfolio. We’re excited to announce the general availability of our support for Google Workspace Client-Side Encryption,

How to Achieve Agility, Collaboration, and Complete Control of Data in the Cloud

How to Achieve Agility, Collaboration, and Complete Control of Data in the Cloud

This article on securing data in the cloud was originally featured in Computer Weekly. 

Turning Enterprise Security Inside Out

Turning Enterprise Security Inside Out

This article was originally featured on Intelligent CISO.