top of page


Data Strategy Breakdown Series - Defence in depth & Zero Trust (1)
In this first post, we explore how to create a strong data security foundation using defence in depth and Zero Trust strategies. With identity now acting as the new perimeter, it's more critical than ever to secure every layer—from users and devices to data and applications. Backed by real client examples, this post unpacks why labels alone aren’t enough, and how a proactive, prioritised approach can better protect your business from both external and insider threats.
Apr 30, 20255 min read


Why Microsoft Purview projects fail before they even begin - and how to stop that from happening
Microsoft Purview isn’t just another tool you switch on and walk away from. It’s a full-on transformation.
Apr 9, 20253 min read


Understanding Exact Data Match (EDM) Classifier in Microsoft Purview - part 1
Introduction In the realm of data governance and security, ensuring accurate classification and protection of sensitive information is...
Sep 25, 20243 min read
bottom of page





