Strengthening Your Human Firewall through Ongoing Security Training and Guidance
Educating end users is a process, not an event
Educating end users is a process, not an event
Sony Pictures Entertainment is the most recent and, perhaps, the highest-profile victim of what might be considered a “Category 5” hack. But it’s hardly the only company to get digitally pants’d by hackers. Here is a list of some other notable victims and details of how they got hacked.
Data Governance defined in Data Protection 101, our series covering the fundamentals of information security.
The definitive guide to developing and deploying data loss prevention strategy, from tips for quick wins to DLP software and tools.
Where can you find a good framework for designing and implementing data-centric security?
Revelations this week about the extent of the breach at Sony Pictures Entertainment should scare the pants off corporate America.
The majority of successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach.
Endpoint protection defined in the first installment of our Data Protection 101 series.
Focusing security efforts on sensitive data to meet healthcare regulatory requirements