Data Protection September 17, 2015 Embrace Green Energy Initiatives — With an Eye Toward Security 3 min read - More companies are implementing green energy initiatives, but this often leads to specific security and privacy concerns that must be addressed.
Data Protection September 16, 2015 Tech Travel Security: Carry-On or Checked Baggage? 3 min read - Travelers need to assess their travel security strategy to make sure they are avoiding threats that put their critical data and physical safety at risk.
September 2, 2015 Getting Out: Data Exfiltration Gets Sophisticated 2 min read - Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?
CISO August 31, 2015 Protecting Student Information: A CISO’s Point of View 4 min read - David Sherry, the CISO at Brown University, describes the steps taken to secure student information without inhibiting information sharing.
August 25, 2015 The Ashley Madison Security Breach: An Affair to Remember? 2 min read - The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?
Data Protection August 25, 2015 Get Equipped to Face Mounting Threats to Your Sensitive Data 2 min read - Guardium lets security teams automatically analyze their data environment, minimize risk, protect sensitive data and seamlessly adapt to change.
Data Protection August 17, 2015 Analyze, Protect, Adapt: Could You Win the Data Security Triple Crown? 4 min read - Winning the Triple Crown of data security means being able to protect your sensitive information while also analyzing and adapting your security practices.
Endpoint August 12, 2015 I Know Everything About You! The Rise of the Intelligent Personal Assistant 3 min read - An intelligent personal assistant (IPA) can be of tremendous help to individuals, but it may pose a security risk if users aren't careful.
Intelligence & Analytics August 5, 2015 TMI? Security Intelligence Can Get You That ‘Manageable List’ You Need 2 min read - The QRadar SIEM solution applies security intelligence and advanced analytics to millions or even billions of security events per day.
Data Protection July 31, 2015 Data Activity Monitoring and Data Loss Prevention: A Balanced Approach to Securing Your Critical Assets 3 min read - Security teams need to invest in data activity monitoring and data loss prevention if they expect to prevent damaging breaches.