New & Notable
Data loss prevention technology News
June 29, 2018
McAfee's new 'Blockchain Threat Report' charts a dramatic rise in cryptomining malware and details four major attack vectors for cryptocurrency-related threats.
February 27, 2018
Data loss prevention strategies help prevent unauthorized disclosure of sensitive information. For a DLP strategy to be successful, however, business-wide buy-in is required.
January 12, 2017
Experts are impressed with the simplicity of Google's Cloud KMS even if it doesn't separate itself from the key management service competition.
February 01, 2016
The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments.
Data loss prevention technology Get Started
Bring yourself up to speed with our introductory content
Countering cyberthreats through human effort alone is impossible; you need to add AI and machine learning products to your security program. Here's how to get started. Continue Reading
Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; often, the first indication a user has that a computing device has been infected with spyware is a noticeable reduction in ... Continue Reading
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
Evaluate Data loss prevention technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A lot is going on in the market for resilience. Acquisitions, partnerships and other consolidations have bundled DR planning offerings, creating one-stop shopping experiences. Continue Reading
Digital signatures on PDF documents don't necessarily guarantee their contents are valid, as new research shows viewer implementations don't always detect incomplete signatures. Continue Reading
With the enterprise perimeter a mere memory, how can enterprises hope to secure their mission-critical data and systems? Continue Reading
Manage Data loss prevention technology
Learn to apply best practices and optimize your operations.
CISO Kevin Charest talks security threats he sees in the healthcare field and the means his company is using to thwart them, including HCSC's Cyber Fusion Center. Continue Reading
Artificial intelligence, and machine learning in particular, is being fruitfully employed in IT security tools. Learn where this advanced technology works best now. Continue Reading
There are three key categories of vendor zero-trust products. Learn what they are, and how to evaluate and implement the one that's best for your company. Continue Reading
Problem Solve Data loss prevention technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As part of a larger security strategy, watermarking virtual desktops can help IT discourage data leakage by adding user-specific text to each desktop. Continue Reading
Botnets are evolving and will continue to plague organizations. There is no one tool that will be sufficient, so it’s time to layer your anti-botnet defenses. Continue Reading
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading