Securing Your Data Supply Chain: a Q&A with Dan Geer
Security luminary Dan Geer shares his thoughts on the need for collaboration in security.
What is Endpoint Security? Data Protection 101
Endpoint security defined in Data Protection 101, our series on the fundamentals of information security, data loss prevention, and more.
Building a Strong Foundation: 6 Takeaways from Forrester’s Rethinking Data Discovery & Classification Report
Forrester's report on data discovery & classification has several key takeaways for any data loss prevention program. I'd like to share my personal favorites.
Strengthening Your Human Firewall through Ongoing Security Training and Guidance
Educating end users is a process, not an event
Five Devastating Hacks That Predate Sony
Sony Pictures Entertainment is the most recent and, perhaps, the highest-profile victim of what might be considered a “Category 5” hack. But it’s hardly the only company to get digitally pants’d by hackers. Here is a list of some other notable victims and details of how they got hacked.
What is Data Governance? Data Protection 101
Data Governance defined in Data Protection 101, our series covering the fundamentals of information security.
The CISO’s Guide to Data Loss Prevention: DLP Strategy Tips, Quick Wins, and Myths to Avoid
The definitive guide to developing and deploying data loss prevention strategy, from tips for quick wins to DLP software and tools.
It Isn’t All About You – 5 Takeaways from Forrester’s “Zero Trust Approach” Report
Where can you find a good framework for designing and implementing data-centric security?
Poor Security on Display at Sony as Gigabytes of Data take Wing
Revelations this week about the extent of the breach at Sony Pictures Entertainment should scare the pants off corporate America.
Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach
The majority of successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!