Resources

Blog

Feeling the Heat with Data Loss

Since heat is a natural byproduct of digital computation, why not use this electromagnetic emanation as a bypass for air-gap systems?
Blog

An 8 Step Framework for Secure Cloud Adoption

Don’t let concerns over cloud security risks prevent your organization from reaping the benefits of cloud computing. Use this 8 step framework to secure your organization’s cloud adoption efforts.
Blog

What is File Fingerprinting?

File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.
Blog

What Is Content Inspection?

Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Blog

Terabytes of Data Stolen? The Lessons of Operation Iron Tiger

A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?