Newsroom

Blog

Can you "leak" public information?

The personal information on world leaders attending the G20 summit was accidentally released to a third party. Is it a data breach? Maybe not.
Blog

7 Ways to Lose Sensitive Data

With trends like BYOD, workforce mobility, and the adoption of cloud and web applications for business, there are more opportunities for sensitive data loss than ever before. Here are our top 7 ways that sensitive data is most commonly lost as well as tips for preventing data loss.
Blog

Why Managed Security Services?

Managed security services are becoming an increasingly popular option for increasing the value brought by security solutions while reducing IT complexity.
Blog

What is Application Control? Definition, Best Practices & More

Application control is a security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk. The control functions vary based on the business purpose of the specific application, but the main objective is to help ensure the privacy and security of data used by and transmitted between applications.
Blog

The Data Breaches That Weren't

Minecraft is the latest company to be wrongfully accused of losing control of customer data. The real culprit: users, themselves.