New & Notable
Data Loss Prevention News
February 11, 2014
NBC's report on hacking in Russia stretched the truth, experts said, but travelers who ignore business data security basics face risks everywhere.
January 16, 2014
Expert Joseph Granneman looks back at the 2013 Verizon DBIR and provides key takeaways for companies looking to avoid being part of the 2014 edition.
May 24, 2013
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client.
February 25, 2013
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer.
Data Loss Prevention Get Started
Bring yourself up to speed with our introductory content
Expert Michael Cobb discusses how to identify the data egress points in enterprise databases to prevent malicious data exfiltration. Continue Reading
Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions. Continue Reading
Extrusion prevention is the practice of stopping data leakage by filtering outbound network traffic. Extrusion prevention protects sensitive digital assets from unauthorized transfer by stopping the movement of packets across the network. ... Continue Reading
Evaluate Data Loss Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises should be worried about the growth of BYOD mobile app data slurping. Explore how to combat data slurping and ensure mobile app security. Continue Reading
Analyst Anton Chuvakin explains how to use SIEM technology to identify unauthorized access attempts that can lead to data theft. Continue Reading
Readers vote on the top data loss prevention products in 2013: Information loss prevention, extrusion prevention, protecting intellectual property, identifying and securing sensitive data. Continue Reading
Manage Data Loss Prevention
Learn to apply best practices and optimize your operations.
Third-party vendor management is important for avoiding incidents like the Target breach. Joseph Granneman offers four must-have security controls. Continue Reading
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for ... Continue Reading
Expert Mike Chapple determines whether predefined DLP rules can actually help enterprises to avoid HIPAA and PCI DSS compliance violations. Continue Reading
Problem Solve Data Loss Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat. Continue Reading
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Continue Reading
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Continue Reading