What is a Data Repository? (Definition, Examples, & Tools)
Learn about what a data repository is, the best practices for working with them, and more in Data Protection 101, our series on the fundamentals of information security.
What Does a Cyber Threat Hunter Do?
Learn about what a cyber threat hunter does in Data Protection 101, our series on the fundamentals of information security.
What is Deep Packet Inspection? (And How it Really Works)
Learn about deep packet inspection in Data Protection 101, our series on the fundamentals of information security.
What is Adaptive Security? A Definition of Adaptive Security, Benefits, Best Practices, and More
Learn about Adaptive Security in Data Protection 101, our series on the fundamentals of information security.
What is DCAP (Data-Centric Audit and Protection)? A Definition of DCAP, How It Works, Best Practices, and More
Learn about Data-Centric Audit and Protection or DCAP in Data Protection 101, our series on the fundamentals of information security.
What is Security Operations and Analytics Platform Architecture? A Definition of SOAPA, How It Works, Benefits, and More
Learn about Security Operations and Analytics Platform Architecture, or SOAPA, in Data Protection 101, our series on the fundamentals of information security.
What is Security as a Service? A Definition of SECaaS, Benefits, Examples, and More
Learn about security as a service (SECaaS) in Data Protection 101, our series on the fundamentals of information security.
What is User and Entity Behavior Analytics? A Definition of UEBA, Benefits, How It Works, and More
Learn about user and entity behavior analytics (UEBA) in Data Protection 101, our series on the fundamentals of information security.
What is Office 365 Data Loss Prevention? A Definition of Office 365 DLP, Benefits, and More
Learn about Office 365 Data Loss Prevention (DLP) in Data Protection 101, our series on the fundamentals of information security.
What is Fileless Malware (or a Non-Malware Attack)? Definition and Best Practices for Fileless Malware Protection
Learn about fileless malware and how to protect against this threat in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!