Optimizing Your Data Protection: Part One
This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.
This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.
Donating old technology is a great practice - rather than disposing of devices simply because you don't need them, donating lets those devices go to those who will still benefit from their use. However, it's important to securely wipe devices before donating to ensure that your personal data stays private.
Export controls like ITAR and EAR put compliance challenges on many security teams. Our latest whitepaper provides strategies for meeting export compliance and reducing cost with data protection solutions.
A case against Raleigh-based WakeMed is just the latest showing healthcare firms violating patient privacy as they pursue unpaid bills.
This holiday season you might be receiving a voice-controlled gadget – a voice controlled TV, a phone, or even an Amazon Echo. The convenience of this is obvious. But what about the downside? In order for the device to respond to your command – even its wake up command – it must, by definition, be listening. And it could be listening – and recording – a business-related conversation.
Lahey Hospital and Medical Center will pay $850,000 for losing data on just 600 patients. The cause? Weak security for medical devices.
Cyber Monday means big savings for online shoppers, but eager consumers aren’t the only ones to take advantage of the savings event. Here’s how to keep your information secure while shopping online this holiday season.
Last month the Ponemon Institute released its annual Cost of Cybercrime report covering damages from cybercrimes in the past year. Here are some of the key findings.
Since heat is a natural byproduct of digital computation, why not use this electromagnetic emanation as a bypass for air-gap systems?
Don’t let concerns over cloud security risks prevent your organization from reaping the benefits of cloud computing. Use this 8 step framework to secure your organization’s cloud adoption efforts.