What is a Data Protection Officer (DPO)? Learn About the New Role Required for GDPR Compliance in 2019
Learn about the DPO's role in managing organizational data protection and overseeing GDPR compliance in Data Protection 101, our series on the fundamentals of information security.
15 Free Mobile Encryption Apps to Protect Your Digital Privacy
Data Privacy Day is here, bringing an annual reminder to take measures to protect our digital privacy. To promote user privacy we’ve rounded up 15 mobile apps that use encryption to secure users’ digital communications and activities – and at no cost to boot.
Life in the Brave New Crypto World
Advances in consumer technology have made digital surveillance easier than ever for governments and criminals alike. But fear not - as surveillance capabilities have expanded so have the range of encryption systems available to users.
Getting Started with Data Classification
Welcome to the first in a series highlighting our latest eBook, The Definitive Guide to Data Classification. This post focuses on understanding the basics of data classification and dispels some of the myths from 1st generation classification products.
Cybercriminals Turn to Phone for Easy Scams
Criminals, like most humans, are fundamentally lazy. When presented with several options for accomplishing a task, they generally will take the easiest one. For some people that’s a function of their skill set, but for others it’s simple practicality. Easier is better. And for criminals, easier also means more money.
Are employees slowly leaking data by adopting new communications services?
We’ve seen a lot of reports on encrypted messaging applications in the news recently, but one question remains unanswered: are data leaks via these applications a real risk for enterprises today?
How to Secure Intellectual Property from Loss or Compromise
28 data protection experts weigh in with tips on securing intellectual property in its many forms.
For Data Thieves, the Internet of Easy Pickings
Leaks of data from the U.S. Military’s Special Operations Command (SOCOM) show that many data breaches are just a matter of picking low hanging fruit.
Premature Attribution
Technology in general and information security specifically have changed so dramatically in the past 10 years that it’s difficult to even remember how things were a decade ago. Nearly everything has shifted and evolved, but one of the few things that’s remained the same is the minefield of attribution.
Why Data Classification Should Drive your Security Strategy: A Q&A with Tony Themelis
Tony Themelis answers 6 questions about how data classification can bolster your security strategy.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.