Best Practices and Solutions for Securing Enterprise Data in Office 365 (O365)
17 IT and security professionals discuss the best practices and solutions for securing enterprise data in Office 365.
17 IT and security professionals discuss the best practices and solutions for securing enterprise data in Office 365.
A database containing more than 1.4 billion stolen passwords exposes the collective shame of weak passwords and password reuse.
What would it mean to have a post-breach society, in which there’s no data left to steal because it has all been stolen? We may be about to find out.
Regular data security risk assessments are a core component of many regulatory compliance requirements, internal policies, or confidentiality agreements. Follow this guide for an effective, phased approach to data at rest risk assessments.
Recent highly publicized cyber attacks at large law firms such as Mossack Fonseca, Cravath, and Weil Gotschal have made apparent the widespread shortcomings in security safeguards in the legal industry. Here are 5 tips on how law firms can address these concerns and protect sensitive data.
19 data classification experts share their recommendations for evaluating data classification tools.
Let’s get something straight: Encryption is still legal in the United States. That may not be true for much longer, but it’s true as of this writing.
Encrypted connections are becoming an industry standard for high-traffic websites, and for good reason.
In a worrying sign, Department of Defense Contractors requested and won an almost two year extension on new rules that would require them to protect sensitive information stored on their networks.
Competitive forces in the pharmaceutical industry have led to increased intellectual property theft. As this trend continues, pharmaceutical companies and manufacturers of all industries must focus on protecting the sensitive data that their competitive advantage is built on.