Data Loss Prevention News
December 05, 2014
News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
May 24, 2013
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading
The term 'data loss prevention' can be difficult to understand as it is used very broadly in the security industry. Learn the true definition of DLP and uncover why it is often the cause of confusion. Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud data loss prevention offers many advantages to enterprises today, but it is not without challenges. Expert Rob Shapland discusses the issues to be aware of. Continue Reading
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Disaster recovery planning is something that seems challenging for all businesses. Virtualization in addition to its operational flexibility,...Continue Reading
Set up is very easy. Pick your proxy server, set up the repositories and off you go. The backup compressions needs work.Powered by IT Central Station
Valuable Features: Replication WAN Accelerator Backup Ease of use File Level restoration • Improvements to My Organization: Restores...Continue Reading
You avoid costly and time consuming DR recovery tests but vSphere needs additional scalability for smaller sitesPowered by IT Central Station
Valuable Features: Key feature for me is the ability to test recovery plans with zero impact to the production running environment, this is key...Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
Not every business needs a data loss prevention system. Security expert Rich Mogull offers clues to help your organization decide if DLP will suit its business needs. Continue Reading
Video: Rich Mogull says if you take away any one of the Data Breach Triangle's three key components, a breach becomes impossible. The Securosis CEO explains this unique perspective on data breach prevention. Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading