Email Alerts
-
Effective DLP products need data discovery and data fingerprinting
Effective DLP products must be able to handle data discovery to identify and monitor sensitive data. Learn why these features matter. Tip
-
Choosing security products: DLP technology
Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. guide
-
The pros and cons of SSL decryption for enterprise network monitoring
Expert Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring method. Answer
-
Assumption of breach: How a new mindset can help protect critical data
By adopting the assumption-of-breach security model, CISOs and security pros can better protect critical data. Expert Ernie Hayden explains. Tip
-
International data protection: 'Evil maid' attacks, HDD cloning risks
Video: Cryptoseal CEO Ryan Lackey details the threats associated with international data protection, from cloned hard drives to evil maid attacks. Video
-
Improving enterprise email security: Systems and tips
Enterprise email security has become more vital than ever due to increased attacks and threats. This tip details systems that can improve protection. Tip
-
Experts at the CSA 2013 Summit say mobile security depends on cloud security
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer. News
-
BYOD security: How to remotely wipe iPhone and Android devices
Remote data wipe is key to any BYOD security policy, but each OS handles it differently. Lisa Phifer covers how to use it with other controls to protect data. Tip
-
Social engineering, employee gaffes require full attention, says expert
Technologies like data loss prevention boost protection, but a determined adversary will get past the sensors, explains security expert Hugh Thompson. News
-
Lessons learned from real-world DLP technology deployments
Successful data loss prevention deployments require data governance maturity, a great deal of tuning and acknowledgement that it's not a panacea. News
Security Management Strategies for the CIO