New & Notable
Data loss prevention technology News
June 29, 2018
McAfee's new 'Blockchain Threat Report' charts a dramatic rise in cryptomining malware and details four major attack vectors for cryptocurrency-related threats.
February 27, 2018
Data loss prevention strategies help prevent unauthorized disclosure of sensitive information. For a DLP strategy to be successful, however, business-wide buy-in is required.
January 12, 2017
Experts are impressed with the simplicity of Google's Cloud KMS even if it doesn't separate itself from the key management service competition.
February 01, 2016
The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments.
Data loss prevention technology Get Started
Bring yourself up to speed with our introductory content
Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; often, the first indication a user has that a computing device has been infected with spyware is a noticeable reduction in ... Continue Reading
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
Protecting an organization against cloud DDoS attacks doesn't have to be expensive. Expert Frank Siemons discusses the options for cost-effective DDoS protection. Continue Reading
Evaluate Data loss prevention technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With the enterprise perimeter a mere memory, how can enterprises hope to secure their mission-critical data and systems? Continue Reading
Zero trust is the path forward to secure corporate IT assets. Learn how to put into place a zero-trust security model with a microsegmentation strategy. Continue Reading
Botnets are evolving and will continue to plague organizations. There is no one tool that will be sufficient, so it’s time to layer your anti-botnet defenses. Continue Reading
Manage Data loss prevention technology
Learn to apply best practices and optimize your operations.
There are three key categories of vendor zero-trust products. Learn what they are, and how to evaluate and implement the one that's best for your company. Continue Reading
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords were put at risk. Continue Reading
Protecting data in the enterprise is a crucial but challenging task. Expert Charles Kao shares key steps and strategies to consider to identify and protect high-value data. Continue Reading
Problem Solve Data loss prevention technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As part of a larger security strategy, watermarking virtual desktops can help IT discourage data leakage by adding user-specific text to each desktop. Continue Reading
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading
Cybercriminals use targeted attacks to endanger the future of your organization. Learn what defensive moves you can put in place now to avoid more severe attacks later on. Continue Reading