Endpoint September 1, 2015 Keeping Your Data Safe: How to Build an Endpoint Security Strategy Based on Confidence 3 min read - Is your organization approaching its endpoint security with confidence or fear? Your answer could impact how effectively you prevent data breaches.
Data Protection August 25, 2015 Get Equipped to Face Mounting Threats to Your Sensitive Data 2 min read - Guardium lets security teams automatically analyze their data environment, minimize risk, protect sensitive data and seamlessly adapt to change.
Data Protection August 17, 2015 Analyze, Protect, Adapt: Could You Win the Data Security Triple Crown? 4 min read - Winning the Triple Crown of data security means being able to protect your sensitive information while also analyzing and adapting your security practices.
Data Protection July 31, 2015 Data Activity Monitoring and Data Loss Prevention: A Balanced Approach to Securing Your Critical Assets 3 min read - Security teams need to invest in data activity monitoring and data loss prevention if they expect to prevent damaging breaches.
Data Protection July 22, 2015 The Mishandling of Sensitive Data: Do You Really Know What You Don’t Know? 3 min read - Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.
Data Protection July 22, 2015 Data Compliance — Do You Really Have What It Takes? 2 min read - Data compliance automation is essential and can help keep you sane. But how can you apply it in your organization without a large investment of resources?
Data Protection July 17, 2015 Do You Have Imperfect Data Security? Three Common Pitfalls 3 min read - You might think your sensitive data is secure — but is it really? When navigating the wide array of data security tools available today, you need to be aware of some of the common pitfalls to watch out for so…
June 15, 2015 Cybersecurity Risk: Right Resources, Wrong Place Put Companies Under Threat 2 min read - Seventy-five percent of companies say they aren't mature enough to handle cybersecurity risk. The biggest problem? Poor resource allocation.
Data Protection June 1, 2015 Organizations Ramp Up on NoSQL Databases, but What About Security? 3 min read - Innovative organizations are moving toward NoSQL databases, and security teams must be ready to protect data, ensure compliance and stave off attacks.
May 29, 2015 IRS Data Theft Taxes Patience of 100,000 Users 2 min read - News of an IRS data theft reveals that 100,000 tax returns were stolen using "Get Transcript," prompting $50 million in fraudulent refunds.