What Is Content Inspection?
Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
The attack on an obscure photo printing vendor underscores the risk that third parties pose in the age of outsourcing.
Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.
Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
We asked a panel of data security professionals to provide expert recommendations for hiring MSSPs. See what the experts had to say.
The Third Circuit's recent ruling sets a new precedent for the FTC's ability to regulate data breaches and other cybersecurity incidents. What does this mean for the security industry?
Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?