What is Application Whitelisting? (Definition & Tips)
Application whitelisting defined, how application whitelisting works, and more in Data Protection 101, our series on the fundamentals of data security.
In Security Many Things Change, But Much Remains the Same
#TBT: While reviewing our content for 2015 planning we uncovered a gem – the 2006 corporate video for Verdasys/Digital Guardian.
FTC Issues Security Guidelines for Internet of Things Technology
New Report from the Federal Trade Commission Presents Key Findings from 2013 IoT Workshop
What is an Insider Threat? An Insider Threat Definition
Insider threat defined in Data Protection 101, our series on the fundamentals of data security.
Reflections on the State of the Union address and Obama's cybersecurity proposals
The highly anticipated State of the Union address has come and passed, leaving us with promises for bolstered cybersecurity at the government level.
Data Protection and Cybersecurity Legislation Top Priorities for President Obama
With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.
Make vs. Buy: The CISO's Guide to Evaluating Managed Security Services
Some important considerations for CISOs faced with the decision of whether to tackle security initiatives in-house or outsource to a managed security service provider.
Enterprise Data Security Breaches: Experts on How Companies Can Protect Themselves From Big Data Breaches
Most businesses today are well aware of the need to have a comprehensive data security strategy to protect themselves, their employees and their customers from various security threats. And fortunately for many small to medium sized businesses, due to their size and simpler business structures, a standard data security plan will be enough to accomplish their data security needs.
The Art of Stealing Terabytes
How did hackers manage to extract terabytes of data from the network of Sony Pictures without direct, physical access? It may have been easier than you would think.
What is Endpoint Detection and Response (EDR)?
Endpoint Detection and Response defined in Data Protection 101, our series on the fundamentals of data security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!