{"id":44525,"date":"2024-12-03T12:14:38","date_gmt":"2024-12-03T12:14:38","guid":{"rendered":"https:\/\/www.techmagazines.net\/?p=44525"},"modified":"2024-12-03T12:14:40","modified_gmt":"2024-12-03T12:14:40","slug":"5-common-data-security-gaps-and-how-dspm-can-fill-them","status":"publish","type":"post","link":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/","title":{"rendered":"5 Common Data Security Gaps and How DSPM Can Fill Them"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 6<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Katrina Thompson<\/p>\n\n\n\n<p>Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner. However, at the time it only had about 1% market saturation. As of last year, it had no less than a full fifth (20%, per &#8230;.).&nbsp;<\/p>\n\n\n\n<p>Why the meteoric rise? Because DSPM plugs some crucial security gaps that have been hard to plug in any other way. A lot of these gaps remain because the digital terrain has become increasingly broad (think multi-cloud, remote work, and lengthening supply chains) as well as deep (shadow data, hidden APIs, petabytes of big data that need to be accounted for).<\/p>\n\n\n\n<p>Current solutions like CSPM (Cloud Security Posture Management) and XDR (Extended Detection and Response) are great for securing the places in which data resides, but there are still areas between those places where data falls through.&nbsp;<\/p>\n\n\n\n<p>Here are just five of the most common data security gaps and how DSPM can fill them.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Data transferred and stored via unconventional means\u00a0<\/strong><\/li>\n<\/ol>\n\n\n\n<p>The term \u2018unconventional\u2019 in this case is increasingly becoming conventional, but the fact remains that these are methods that most traditional security solutions fail to secure properly.<\/p>\n\n\n\n<p>Think about when information gets copied and pasted from Box and into a company-wide PowerPoint presentation. Let\u2019s say that the Box repository was access-protected and that the employee who accessed it had the permission to do so. Traditional security tools would call that good \u2013 all the rules are being followed. But what would track the fact that that data now resides on a PPT that was emailed to \u201cAll Users\u201d? And how does a company track where it goes from there?<\/p>\n\n\n\n<p>Via data lineage, DSPM tools can show organizations where their data originated, where it was moved, how it was used, and where it was seen last. This helps SOCs know when something has gone amiss and when compliance policies are breached.&nbsp;<\/p>\n\n\n\n<p>Additionally, proxies, firewalls, and CASBs (Cloud Access Security Brokers) are losing visibility into data bound for unsanctioned cloud apps (that require end-to-end encryption or certificate pinning), and DSPM can leverage data lineage and mapping to keep that information within an organization\u2019s line of sight.&nbsp;<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Dark data\u00a0<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Another place where data falls through the cracks is in the realm of dark data. Dark data is defined by Gartner as \u201cthe information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing).\u201d<\/p>\n\n\n\n<p>This undiscovered data could be one of an organization\u2019s biggest untapped assets. As <a href=\"https:\/\/www.ibm.com\/topics\/dark-data#3\">IBM<\/a> notes, \u201cDark data often comes about because of silos within the organization. One team creates data that could be useful to another, but that other team doesn\u2019t know about it.\u201d Once it is discovered and used, it can then \u201c[go] from sitting around to providing immense value.\u201d<\/p>\n\n\n\n<p>DSPM tools have the capacity to uncover instances of dark data, classify them, and prepare them to be leveraged by their organizations. They can also help define the risk associated with these unbound, undisclosed assets and help data governance tools reach them.&nbsp;<\/p>\n\n\n\n<p>Keep in mind that DSPM is still very much an evolving field; some DSPM tools provide this, some don\u2019t. In a rundown of the <a href=\"https:\/\/www.cyberhaven.com\/guides\/top-data-security-posture-management-dspm-products-tools-vendors-solutions\">top ten DSPM products of 2024<\/a>, data security firm Cyberhaven pointed to BigID as one vendor in particular that can offer this capability.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Shadow data<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Shadow data, or shadow assets, are similar to dark data in that they\u2019re undiscovered. They differ in that they might not be particularly useful to an organization. In fact, they are most likely a huge liability.&nbsp;<\/p>\n\n\n\n<p>When developers spin up APIs, for instance, some get deployed for testing and forgotten by the wayside as the rapid pace of development pushes things along. All too often, those old beta APIs are left fully functional and unprotected. Then, a nosy threat actor comes along and shows the organization what a shadow API can (still) do.&nbsp;<\/p>\n\n\n\n<p>We want to avoid these instances. However, it\u2019s much too hard for developers to retrace their steps and find them all, much less take the time to work hand-in-hand with security to do so (even though DevOps is very much a thing. It\u2019s just not ubiquitously adopted across all organizations yet). How hot are shadow APIs to the cybercrime economy? One report suggests that over <a href=\"https:\/\/www.darkreading.com\/application-security\/shadow-apis-an-overlooked-cyber-risk-for-orgs\">31% of all malicious requests<\/a> (roughly 5 billion out of 16.7 billion total) targeted these unknown and unaccounted-for application programming interfaces. And there are still shadow IoT, shadow IT, shadow SaaS, and more.&nbsp;<\/p>\n\n\n\n<p>DSPM solutions are positioned to find instances of shadow data and bring them into the light. They can scan for unstructured or structured data, searching across \u201ca variety of cloud environments and read from various databases, data pipelines, object storage, disk storage, managed file storage, data warehouses, lakes, and analytics pipelines \u2014 both managed and self-hosted,\u201d as noted by cybersecurity company <a href=\"https:\/\/www.rubrik.com\/insights\/what-is-dspm\">Rubrik<\/a>.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Cloud-native data environments<\/strong><\/li>\n<\/ol>\n\n\n\n<p>This is another huge gap in which traditional security measures fall short. We all know about the shared responsibility model in which CSPs (cloud service providers) provide some pieces of the security pie, and customers are responsible for the others. That\u2019s fine, but we also know that on-premises security still is not a direct transfer into cloud environments, and new, cloud-savvy experts are hard to come by. It seems that threat actors know this, as 82% of breaches involved cloud-stored data in 2024, per <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IBM\u2019s Cost of a Data Breach Report 2024<\/a>. There must be room for improvement somewhere.<\/p>\n\n\n\n<p>DSPM is especially suited to finding data in the cloud, even across multiple cloud environments \u2013 and let\u2019s face it, most companies are using multi-cloud these days. Per <a href=\"https:\/\/www.statista.com\/statistics\/1472537\/use-of-multi-cloud-architectures-in-firms\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Statista<\/a>, \u201caround 57 percent of respondents stated that their organization&#8217;s primary use of multi-cloud was apps siloed on different cloud[s],\u201d according to a 2024 survey.\u00a0<\/p>\n\n\n\n<p>DSPM locates, identifies, and protects data assets in the cloud \u2013 any and all of them \u2013 by using a mixture of AI, machine learning, and integrations with available tools. These tools include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>API integrations <\/strong>| Cloud provider APIs give DSPM solutions access to data within cloud services (Azure Blob Storage, Google Cloud Storage, Amazon S3).<\/li>\n\n\n\n<li><strong>Data classification<\/strong> | DSPM tools take it a step further by using algorithms to classify cloud-discovered data by priority (PII, HIPAA-compliant, IP, etc.)<\/li>\n\n\n\n<li><strong>Data flow analysis <\/strong>| DSPM technology can analyze the flow of data throughout its lifecycle in the cloud(s) and establish baselines against which it can then spot anomalies that betray unsafe practices.<\/li>\n<\/ul>\n\n\n\n<p>And more.<\/p>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><strong>Data transferred through the supply chain<\/strong><\/li>\n<\/ol>\n\n\n\n<p>It\u2019s hard enough for modern enterprises to keep up with all this complexity (above) in their own environment. Now, imagine having to be responsible for making sure it\u2019s done for everyone in your supply chain. It\u2019s been an unspoken rule in any industry for a long time: if you take on the contractor, you assume the risk. The public certainly feels that way when a supply-chain breach brings down their favorite company (let\u2019s talk about the attack on <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">Solar Winds\u2019 Orion software<\/a>. No one calls it the \u2018Orion attack\u2019).&nbsp;<\/p>\n\n\n\n<p>That being said, as higher-ups like CISOs are increasingly being held as primarily responsible for securing the enterprise against even risks brought by third parties, companies need a way to keep that external data risk level under control.&nbsp;<\/p>\n\n\n\n<p>DSPM not only locates where sensitive data is stored (or where it is regardless), but it also notes which users can access it \u2013 including external third parties. Plus, with the ability to enforce security policies, DSPM tools can automatically apply data usage rules and access controls across all third-party integrations. This means that even if they weren\u2019t handling data per your standards before, a DSPM platform can help ensure that they are <em>now<\/em>.&nbsp;<\/p>\n\n\n\n<p><strong>A Tool for Its Time<\/strong><\/p>\n\n\n\n<p>DSPM came about because today\u2019s complex digital landscape proved too difficult for traditional security tools to traverse. Organizations needed faster, more streamlined ways of keeping track of the Big Data they tried so hard to accumulate (and succeeded at accumulating). Between multiple cloud services, myriads of SaaS apps, and the nearly innumerable ways in which everyday employees could manipulate data (even sensitive data), there needed to be a way to track it all at scale, despite its environment.&nbsp;<\/p>\n\n\n\n<p>DSPM provides organizations with that way, filling several of the most critical data security gaps that today&#8217;s other solutions leave behind.<\/p>\n\n\n\n<p><strong>About the author:<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXd-d8NCVGJBl_rC7JikWpmQlqD4SPUnS1PDALdqzVswajP0Qxh0g_-AZv8uuR483Ple8XZGn7aag5V_2tuewzrkyU4NQU4TqYxIfR3YolRvEELjX4hM7FxzPFZEWQN4T6Un0ZffRpL0MQUA5mdptg?key=XaiQN3mOh7e8wlpohDNq0ia_\" alt=\"A person with brown hair and a red shirt\n\nDescription automatically generated\"\/><\/figure>\n\n\n\n<p>An ardent believer in personal data privacy and the technology behind it, Katrina Thompson is a freelance writer leaning into encryption, data privacy legislation, and the intersection of information technology and human rights. She has written for <a href=\"https:\/\/www.welcometobora.com\/\">Bora<\/a>, Venafi, Tripwire, and many other sites.\u00a0<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"wpm_excerpt clearfix\"><p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 6<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner. However, at &hellip;<\/p>\n<\/div>","protected":false},"author":94,"featured_media":39818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-44525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine<\/title>\n<meta name=\"description\" content=\"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine\" \/>\n<meta property=\"og:description\" content=\"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-03T12:14:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-03T12:14:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1126\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechMagazines Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechMagazines Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\"},\"author\":{\"name\":\"TechMagazines Staff\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/2d72457ec733012e4ffdcd1bf15a15c0\"},\"headline\":\"5 Common Data Security Gaps and How DSPM Can Fill Them\",\"datePublished\":\"2024-12-03T12:14:38+00:00\",\"dateModified\":\"2024-12-03T12:14:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\"},\"wordCount\":1470,\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\",\"url\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\",\"name\":\"5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg\",\"datePublished\":\"2024-12-03T12:14:38+00:00\",\"dateModified\":\"2024-12-03T12:14:40+00:00\",\"description\":\"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg\",\"width\":1126,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techmagazines.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Common Data Security Gaps and How DSPM Can Fill Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techmagazines.net\/#website\",\"url\":\"https:\/\/www.techmagazines.net\/\",\"name\":\"Tech Magazines\",\"description\":\"Best Digital Tech Magazines Site\",\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techmagazines.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\",\"name\":\"Amit Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"width\":500,\"height\":125,\"caption\":\"Amit Gupta\"},\"logo\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\"},\"description\":\"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.\",\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/2d72457ec733012e4ffdcd1bf15a15c0\",\"name\":\"TechMagazines Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c1a2dd36abb97209d29cbd07b5d27ac1cbc22c3cf9d4db047670063e7b983db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c1a2dd36abb97209d29cbd07b5d27ac1cbc22c3cf9d4db047670063e7b983db?s=96&d=mm&r=g\",\"caption\":\"TechMagazines Staff\"},\"description\":\"Hi, I am Alex Peter, a TechMagazines Staff. Alex Peter is an experienced writer With 5+ years in the industry, he specializes in creating in-depth content on Business, Finance, Tips &amp; Tricks, Crypto and FinTech.\",\"url\":\"https:\/\/www.techmagazines.net\/author\/techmagazines-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine","description":"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/","og_locale":"en_US","og_type":"article","og_title":"5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine","og_description":"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.","og_url":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/","og_site_name":"Tech Magazine","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_published_time":"2024-12-03T12:14:38+00:00","article_modified_time":"2024-12-03T12:14:40+00:00","og_image":[{"width":1126,"height":550,"url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg","type":"image\/jpeg"}],"author":"TechMagazines Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TechMagazines Staff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#article","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/"},"author":{"name":"TechMagazines Staff","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/2d72457ec733012e4ffdcd1bf15a15c0"},"headline":"5 Common Data Security Gaps and How DSPM Can Fill Them","datePublished":"2024-12-03T12:14:38+00:00","dateModified":"2024-12-03T12:14:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/"},"wordCount":1470,"publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"image":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg","articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/","url":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/","name":"5 Common Data Security Gaps and How DSPM Can Fill Them | Tech Magazine","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage"},"image":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg","datePublished":"2024-12-03T12:14:38+00:00","dateModified":"2024-12-03T12:14:40+00:00","description":"Katrina Thompson Data Security Posture Management (DSPM) has been in the public security eye since about 2022 when the term was coined by Gartner.","breadcrumb":{"@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#primaryimage","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2024\/01\/Cybersecurity-in-Healthcare.jpg","width":1126,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.techmagazines.net\/5-common-data-security-gaps-and-how-dspm-can-fill-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techmagazines.net\/"},{"@type":"ListItem","position":2,"name":"5 Common Data Security Gaps and How DSPM Can Fill Them"}]},{"@type":"WebSite","@id":"https:\/\/www.techmagazines.net\/#website","url":"https:\/\/www.techmagazines.net\/","name":"Tech Magazines","description":"Best Digital Tech Magazines Site","publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techmagazines.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2","name":"Amit Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","width":500,"height":125,"caption":"Amit Gupta"},"logo":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/"},"description":"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.","sameAs":["https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs"]},{"@type":"Person","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/2d72457ec733012e4ffdcd1bf15a15c0","name":"TechMagazines Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3c1a2dd36abb97209d29cbd07b5d27ac1cbc22c3cf9d4db047670063e7b983db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3c1a2dd36abb97209d29cbd07b5d27ac1cbc22c3cf9d4db047670063e7b983db?s=96&d=mm&r=g","caption":"TechMagazines Staff"},"description":"Hi, I am Alex Peter, a TechMagazines Staff. Alex Peter is an experienced writer With 5+ years in the industry, he specializes in creating in-depth content on Business, Finance, Tips &amp; Tricks, Crypto and FinTech.","url":"https:\/\/www.techmagazines.net\/author\/techmagazines-staff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/44525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/comments?post=44525"}],"version-history":[{"count":1,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/44525\/revisions"}],"predecessor-version":[{"id":44526,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/44525\/revisions\/44526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media\/39818"}],"wp:attachment":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media?parent=44525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/categories?post=44525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/tags?post=44525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}