
Your Weakest Link May Not be Your Employees After All - Securing Your Data Supply Chain
Securing only your employees isn't enough to keep your data safe today - businesses must extend security measures across their entire data supply chain.
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
Digital Guardian's Blog
Mike Pittenger is vice president, security strategy at Black Duck Software. Mike has over 30 years of technology business experience, including over 15 in application security. He was a co-founder of Veracode and led the product divisions of @stake and Cigital. He can be reached at mwpittenger [at] caddisadvisors.com.
Securing only your employees isn't enough to keep your data safe today - businesses must extend security measures across their entire data supply chain.
When thinking about data protection in today’s world, there is no shortage of attack vectors. Data is everywhere: on laptops, with vendors, on mobile devices, and in the cloud.
Insider threats are particularly pernicious because the attacker has legitimate access to the data and valid credentials. This makes insider threats extremely difficult to defend against.
Forrester just released another informative report on Data Loss Prevention (DLP). It has some great advice for companies looking into DLP, and for those working towards a more mature data loss prevention process. Here are my top 5 takeaways.
Some important considerations for CISOs faced with the decision of whether to tackle security initiatives in-house or outsource to a managed security service provider.
Forrester's report on data discovery & classification has several key takeaways for any data loss prevention program. I'd like to share my personal favorites.
Educating end users is a process, not an event
The definitive guide to developing and deploying data loss prevention strategy, from tips for quick wins to DLP software and tools.
Where can you find a good framework for designing and implementing data-centric security?
Focusing security efforts on sensitive data to meet healthcare regulatory requirements