





















































The typical company houses about 24.8 million sensitive files, according to Rubrik Zero Labs.
A lot of those sensitive files reside in your unstructured data. It's time to extend the protection you're getting across the rest of your data to your unstructured files. Our Solving The Unstructured Data Challenge eBook can show you exactly how.
Access the guide for:
SPONSORED
Welcome to another_secpro!
_secpro is approaching 200 issues and, thanks to our long-standing readership, we have seen this newsletter go from strength to strength. Not only are we offering the same news, advice, and practical application, but we're also offering a subscription service, podcasts, and a variety of other things to help you do your job better. It's been great to play a part in the development of this community, especially when we see it all come together for conferences, events, and our community outreach.
However, we want to look back at a few things we published right in the beginning - a throwback for a relaxing Friday browse. Check out the articles below and let us know what you think!
As always, make sure to check out the templates, podcasts, and other stuff on ourSubstackand access the very best that we have to offer. You might even learn something!
Cheers!
Austin Miller
Editor-in-Chief
Learn about the latest in GenAI for vulnerability management, exposure management and cyber-asset security when you attend the CyberRisk Summit. This free, virtual event on Wednesday, Nov. 20 includes expert speakers from Yahoo, Wells Fargo, IBM, Vulcan Cyber and more. This is the ninth, semi-annual CyberRisk Summit. Attendees can request CPE credits, and all registrants get access to the session recordings. Join us!