Data Privacy & Protection
Community Posts
I'm building most on... share "why" in comments...
Public Cloud72%
Private Cloud27%
How is your organization mitigating risks from smart wearables or covert recording devices during sensitive conversations? Please share any relevant policies, technical solutions, or experiences managing this challenge.
Any tips or best practices you can share for developing a cryptographic bill of materials (CBOM)? What’s the best way to get started?
We're facing a challenge in R&D: our current DRM solution effectively protects sensitive TSIP (Trade Secret and Intellectual Property) data, but it prevents researchers from searching across encrypted files—hindering their work.
While we’ve considered relying solely on SharePoint permissions and Entra capabilities, the growing risk of insider threats makes this a last resort.
Has anyone solved a similar issue? Are there DRM or encryption solutions that allow secure, searchable access to protected content?
VMware Carbon Black22%
Palo Alto Networks Cortex XDR38%
Symantec Endpoint Security42%
Kaspersky28%
BlackBerry Cylance11%
We don't have an EDR tool currently.8%
Other (Please share below)11%
If anyone has successfully used Bring Your Own Key (BYOK) in the cloud: Which Hardware Security Module (HSM) or key management method did you use, and with which cloud service provider(s) (CSP)? Any advice to an organization considering this option?
Excellent (more than enough)11%
Good (we have enough to reach our goals)52%
Acceptable (could be better but we make do)34%
Poor/unacceptable (more funding needed ASAP)3%
Unsure / other