Data Loss Prevention News
December 05, 2014
News roundup: The industry is losing the battle against hidden malware, finding it in unlikely places from sandboxes to e-cigarettes. Plus: Richard Clarke's security tips for CEOs; data loss and downtime cost companies big; and are cheap tablets ...
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
May 24, 2013
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
Product ReviewsPowered by IT Central Station
Top of the list if you're using VMware or Hyper-V. Would be nice to have more supported hyper-visors.Powered by IT Central Station
Valuable Features: Near real time continuous disaster recovery, Journaling and the ability to replicate from Hyper-V and other VMware clouds into...Continue Reading
Powered by IT Central Station
Disaster recovery planning is something that seems challenging for all businesses. Virtualization in addition to its operational flexibility,...Continue Reading
Ability to verify backups of critical servers means I can sleep at night. Backup of physical servers could be better.Powered by IT Central Station
Valuable Features: This is actually quite a hard choice to make when dealing with Veeam Backup & Replication. There are a number of great...Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
Expert contributor Karen Scarfone examines the most important criteria for evaluating email encryption software for deployment within the enterprise. Continue Reading
Enterprises revisit data classification and protection strategies after rocky 2014. Continue Reading
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Remote wipe is the option most people think of when looking to erase data on mobile phones, but it isn't always the most effective. Expert Nick Lewis explores how to fully remove data from a device. Continue Reading
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading