New & Notable
Data Loss Prevention News
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
May 24, 2013
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client.
February 25, 2013
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Expert Michael Cobb discusses how to identify the data egress points in enterprise databases to prevent malicious data exfiltration. Continue Reading
Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions. Continue Reading
Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. Extrusion prevention protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. ... Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP. Continue Reading
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Analyst Anton Chuvakin explains how to use SIEM technology to identify unauthorized access attempts that can lead to data theft. Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. ... Continue Reading
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for ... Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading
Expert Mike Chapple determines whether predefined DLP rules can actually help enterprises to avoid HIPAA and PCI DSS compliance violations. Continue Reading
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Continue Reading