Recent Discussions
- 32Views0likes4Comments
When you’re scrolling through your phone or computer, how do you decide what’s worth keeping and what needs to go?
Or do you ever find yourself holding onto everything, just in case it might matter later? Explore how companies are navigating data retention and deletion policies, and how it impacts your privacy and security—something to always think about.MacchiSmith2 months agoCommunity Manager22Views0likes0CommentsPure Storage continues to take big steps in empowering organizations to bolster their security
Dive into how we built Threat Model Mentor GPT, an AI-powered tool designed to make cybersecurity expertise more accessible for everyone. Read about it here! How do you currently approach threat modeling in your organization?MacchiSmith3 months agoCommunity Manager14Views0likes0CommentsHow often do you reassess third-party security measures?
What prompts these reviews? In today’s interconnected business landscape, third-party cyber threats are an ever-increasing concern, often posing risks that companies overlook. The Pure Storage white paper, "Nine Tips to Block Third-Party Cyber Attacks," offers practical strategies to strengthen supply chain security and minimize vulnerabilities. Read about it!MacchiSmith5 months agoCommunity Manager13Views0likes0CommentsData retention & deletion policies
It’s a little unsettling when we don’t know exactly what’s happening with our personal data. Do you think companies are doing enough to make us feel confident about their data practices, or do you feel like they could do more? Ever wonder what really happens to your data once you hit "delete"? This blog takes a deep dive into data retention and deletion policies, exploring how companies are balancing compliance and your privacy.MacchiSmith3 months agoCommunity Manager12Views0likes0Comments- MacchiSmith10 months agoCommunity Manager11Views0likes0Comments