What is DCAP (Data-Centric Audit and Protection)? A Definition of DCAP, How It Works, Best Practices, and More
Learn about Data-Centric Audit and Protection or DCAP in Data Protection 101, our series on the fundamentals of information security.
Learn about Data-Centric Audit and Protection or DCAP in Data Protection 101, our series on the fundamentals of information security.
According to a study published last week hospital breaches accounted for one third of all data breaches and affected the largest number of victims from 2009 to 2016.
According to a study published last week hospital breaches accounted for one third of all data breaches and affected the largest number of victims from 2009 to 2016.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
In the latest episode of the Digital Guardian podcast, Christopher "Tophs" Elisan, Principal Malware Scientist at RSA, describes recent malware trends he's seen, two approaches to thinking about breaches, and the dangers of attributing attacks.
In the latest episode of the Digital Guardian podcast, Christopher "Tophs" Elisan, Principal Malware Scientist at RSA, describes recent malware trends he's seen, two approaches to thinking about breaches, and the dangers of attributing attacks.
17 IT and security professionals discuss the best practices and solutions for securing enterprise data in Office 365.
Researchers said Tuesday the app was vulnerable to a right-to-left override attack, something which let attackers trick unsuspecting users into installing malware.