What is the Virginia Consumer Data Protection Act?
Learn why organizations will need to implement security practices to protect sensitive data under the Virginia Consumer Data Protection Act (VCDPA), set to go into effect in 2023.
What Are the Most Important Tips for Preventing Trade Secret Theft?
No matter what form they take, trade secrets can be incredibly valuable to a business. We asked 28 IP experts and business leaders what their most important tips are for keeping them safe.
Friday Five 11/18
Inadequate cybersecurity efforts, questionable data privacy practices, and ransomware made the top headlines this past week. Catch up on the latest stories in this week's Friday Five!
Easy Ways to Implement Vulnerability Management
Having a vulnerability management program in place - one that identifies and prioritizes fixing bugs in software - is a critical part of every organization's IT team.
Friday Five 11/11
LockBit may have taken a hit this past week, but that hasn’t stopped ransomware from making the headlines. Catch up on this and more in this week’s Friday Five!
What is DRM Protected Content? Definition, How It Works & More
What does it mean when digital content is DRM protected? We explain how DRM works and protects intellectual property in this blog.
Structured vs. Unstructured Data: A Comprehensive Guide
Learn about the difference between structured data and unstructured data and how to best protect it in Data Protection 101, our series on the fundamentals of information security.
What is a Data Protection Officer (DPO)?
Learn about the DPO's role in managing organizational data protection and overseeing GDPR compliance in Data Protection 101, our information security fundamentals series of materials.
A DEFINITION OF DATA PROTECTION OFFICER
A Data Protection Officer (DPO) is a dedicated business security role that is required by the General Data Protection Regulation (GDPR). Data Protection Officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
5 Common Phishing Lures and How to Spot Them
Don’t take the bait! Learn about some of the most common phishing lures and how to identify them.
Different Types of Data Breaches & How To Prevent Them
Different types of data breaches will affect what type of protection you implement at your company. Understanding each can help you better prepare for an attack.
What Are The Most Common Types of Data Breaches?
The most common types of data breaches are:
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.