Data Loss Prevention is a Marathon, but You get Points for Split Times – 5 Takeaways from Forrester’s “DLP Maturity Grid” Report
Forrester just released another informative report on Data Loss Prevention (DLP). It has some great advice for companies looking into DLP, and for those working towards a more mature data loss prevention process. Here are my top 5 takeaways.
Data Security Experts Reveal the Biggest Mistakes Companies Make with Data & Information Security
30 data security experts discuss the biggest mistakes companies make with data security.
What is Application Whitelisting? (Definition & Tips)
Application whitelisting defined, how application whitelisting works, and more in Data Protection 101, our series on the fundamentals of data security.
In Security Many Things Change, But Much Remains the Same
#TBT: While reviewing our content for 2015 planning we uncovered a gem – the 2006 corporate video for Verdasys/Digital Guardian.
FTC Issues Security Guidelines for Internet of Things Technology
New Report from the Federal Trade Commission Presents Key Findings from 2013 IoT Workshop
What is an Insider Threat? An Insider Threat Definition
Insider threat defined in Data Protection 101, our series on the fundamentals of data security.
Reflections on the State of the Union address and Obama's cybersecurity proposals
The highly anticipated State of the Union address has come and passed, leaving us with promises for bolstered cybersecurity at the government level.
Data Protection and Cybersecurity Legislation Top Priorities for President Obama
With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.
Make vs. Buy: The CISO's Guide to Evaluating Managed Security Services
Some important considerations for CISOs faced with the decision of whether to tackle security initiatives in-house or outsource to a managed security service provider.
Enterprise Data Security Breaches: Experts on How Companies Can Protect Themselves From Big Data Breaches
Most businesses today are well aware of the need to have a comprehensive data security strategy to protect themselves, their employees and their customers from various security threats. And fortunately for many small to medium sized businesses, due to their size and simpler business structures, a standard data security plan will be enough to accomplish their data security needs.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!