Starting on Black Friday, the holiday shopping season is the biggest test of retailers’ security posture all year. Here are some of the threats retailers need to watch out for this season as well as tips for how to protect data in retail environments.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
The Center for Internet Security has published a draft of its next Critical Security Controls release and is looking for your feedback to improve.
With the end of Windows Server 2003 support fast approaching, companies must act now to migrate systems where possible and secure legacy systems.
From the very large to the very small, the drumbeat of stolen data continues. This blog post lists the more – and less – notable data breaches announced in the last two weeks. While some of these breaches have received very little press attention, they are no less important for those people whose information has been stolen.
Unfortunately, when tragedy strikes, so do opportunistic miscreants seeking to take advantage of others' goodwill. Here are a few tips to avoid falling victim to charity scams.
FCC is on the data breach case, fining AT&T $25M for an insider data breach that took place from 2013-2014.
Until earlier this month, the Microsoft’s default setting for Internet Explorer was to disable tracking of users' browsing behavior by default. On April 3, that changed; Microsoft announced that the Do Not Track will no longer be the default setting.
More with a Whimper than a Bang: the FFIEC Issues Guidelines for Destructive Malware Risk Mitigation
The FFIEC is the latest government agency to warn industry of the potential for destructive malware attacks, issuing guidelines to banks and credit unions last month. As the potential for destructive malware attacks increases, follow these guidelines to help keep your systems and data secure.
The insider threat is something that every company must deal with, but effectively mitigating the risk of insider data theft can be difficult. Follow these 5 steps to drastically reduce the chances of insider theft at your company.