Mozilla Allows Users to Delete Firefox Telemetry Data
Companies like Mozilla are using the passage of the CCPA as a way to better empower users to delete their own personal data.
Companies like Mozilla are using the passage of the CCPA as a way to better empower users to delete their own personal data.
The FBI sounded the alarm around two strains of ransomware, LockerGoga and MegaCortex, shortly before the holiday break.
Access to advanced technology and expertise at a cost-effective price is making managed security services an increasingly attractive prospect for many organizations.
In this blog, a complement to our Biggest Incidents in Cybersecurity (in the Past 10 Years) infographic, we look back at some of the biggest moments in cybersecurity history from 2009-2019.
What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.
What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.
Learn about identity and access management (IAM), how IAM works, and why organizations should have IAM in Data Protection 101, our series on the fundamentals of information security.
As the adage goes, you can't secure what you can't see. With that in mind we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.
As the adage goes, you can't secure what you can't see. With that in mind we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.
We count down 10 steps that can be followed to ensure manufacturers are better equipped to deal with IP theft.