Change May Be on the Horizon for Mobile Security Updates
Will scrutiny from government agencies catalyze changes to mobile phone security updates?
5 Tips for Protecting Sensitive Data at the Law Firm
Recent highly publicized cyber attacks at large law firms such as Mossack Fonseca, Cravath, and Weil Gotschal have made apparent the widespread shortcomings in security safeguards in the legal industry. Here are 5 tips on how law firms can address these concerns and protect sensitive data.
Expert Panel: The Top Considerations for Comparing Data Classification Tools
19 data classification experts share their recommendations for evaluating data classification tools.
On Wendy’s Class Action: The Beef’s in the Details
The fast food chain is the latest to face a class action lawsuit on behalf of customers whose credit card data was stolen following a data breach.
Will Hack for Bikes
Anyone who has kids of a certain age is likely familiar with the constant fight to get them to put down their damn iPads and Xbox controllers and go outside or read a book. The struggle is real, and it’s only becoming more difficult as computing and electronics become ever more pervasive parts of modern life.
Building the Case for Law Firm Data Security (Infographic)
Will cyber attacks on law firms tip the scales toward improved data security in the legal industry?
Why I Signed on with an IT Security Vendor
Here's why I jumped to the vendor side of the fence after 12 years as a Fortune 100 incident responder and threat researcher.
Sticky Fingers via Sticky Keys: A Quest for Data Exfil (Screenshot Demo)
VP of Cybersecurity Tim Bandos presents the discovery, analysis, and mitigation of a Sticky Key attack in the latest from DG ATAC - our Advanced Threat and Analysis Center.
What Is Cloud DLP?
Learn more about how data loss prevention solutions are evolving to protect sensitive data in the cloud.
Is Encryption on the Endangered Species List?
Let’s get something straight: Encryption is still legal in the United States. That may not be true for much longer, but it’s true as of this writing.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.