Enterprise Data Security Breaches: Experts on How Companies Can Protect Themselves From Big Data Breaches
Most businesses today are well aware of the need to have a comprehensive data security strategy to protect themselves, their employees and their customers from various security threats. And fortunately for many small to medium sized businesses, due to their size and simpler business structures, a standard data security plan will be enough to accomplish their data security needs.
The Art of Stealing Terabytes
How did hackers manage to extract terabytes of data from the network of Sony Pictures without direct, physical access? It may have been easier than you would think.
What is Endpoint Detection and Response (EDR)?
Endpoint Detection and Response defined in Data Protection 101, our series on the fundamentals of data security.
Securing Your Data Supply Chain: a Q&A with Dan Geer
Security luminary Dan Geer shares his thoughts on the need for collaboration in security.
What is Endpoint Security? Data Protection 101
Endpoint security defined in Data Protection 101, our series on the fundamentals of information security, data loss prevention, and more.
Building a Strong Foundation: 6 Takeaways from Forrester’s Rethinking Data Discovery & Classification Report
Forrester's report on data discovery & classification has several key takeaways for any data loss prevention program. I'd like to share my personal favorites.
Strengthening Your Human Firewall through Ongoing Security Training and Guidance
Educating end users is a process, not an event
Five Devastating Hacks That Predate Sony
Sony Pictures Entertainment is the most recent and, perhaps, the highest-profile victim of what might be considered a “Category 5” hack. But it’s hardly the only company to get digitally pants’d by hackers. Here is a list of some other notable victims and details of how they got hacked.
What is Data Governance? Data Protection 101
Data Governance defined in Data Protection 101, our series covering the fundamentals of information security.
The CISO’s Guide to Data Loss Prevention: DLP Strategy Tips, Quick Wins, and Myths to Avoid
The definitive guide to developing and deploying data loss prevention strategy, from tips for quick wins to DLP software and tools.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!