Data Protection February 2, 2016 Crawl, Walk, Run: Data Security Deployment Advice 2 min read - A successful data security strategy should be handled in three stages: crawl, walk and run. You can learn more at InterConnect 2016.
Data Protection February 1, 2016 Winter Is Here! Are We Headed for an El Niño-Like Data Protection Landscape? 4 min read - Monitoring and tracking weather patterns is not that different from observing cyberthreats. Are you prepared with the best data protection strategies?
Data Protection January 28, 2016 In Today’s Era of Data Breaches, Are You Sure Your Data Is Protected? 3 min read - Protecting your organization from a data breach means you must have the right people, processes and technology all working together.
Data Protection January 27, 2016 Data Security: Securing Your Most Important Asset 2 min read - The most comprehensive data security strategy will be molded to fit the organization's unique risks and collection of sensitive information.
January 25, 2016 File Sharing Puts Enterprise Data at Risk, Report Says 2 min read - The oversharing of enterprise data through shadow IT practices can lead to security issues regarding that information, including data leaks.
Data Protection January 19, 2016 Data Discovery and Classification: Will You Do It or Let the Attackers Do It for You? 2 min read - Organizations must be proactive about data discovery and classification if they hope to outsmart cybercriminals and properly secure information.
X-Force January 13, 2016 2015: An Eventful Year in Cybersecurity 3 min read - A look back at data breaches in 2015 and some simple steps that can be the difference between investigating an alert versus investigating a breach.
January 11, 2016 In Bad Taste? EU Cookie Law Exploited by Clickjackers 2 min read - The EU's Cookie Law is intended to increase user privacy, but some cybercriminals have found a way to use it for their own gain.
Malware January 1, 2016 Mitigating Malware in a Modern, Mobile World 4 min read - Mitigating malware is possible for smartphone and PC users who follow a few simple computing hygiene tips and security best practices.
December 30, 2015 Personal Data of 191 Million Voters Compromised by Misconfigured Database 2 min read - A security researcher recently found 191 million people's personal data is available on the Internet thanks to a misconfigured voter database.