Data Loss Prevention

Data Loss Prevention (DLP)

abstract image of business silhouettes in blurred motion
spring elastic bend slinky stretch

security automation robot protects defends from attack intrusion breach

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

climb mountain scale peaks climber

The hardest part of mountaineering is descending from the summit

Building an information security organization and effective security plan is like planning to climb a mountain. You need to plan for the ascent and descent, and the latter is much more involved and difficult than the former. You...

Why its critical – existential in fact – for us to do our own “analytica” in this day and age.

russian hackers

Toe-to-toe with the Roosskies

Russia is hardly, if at all, deterred by sanctions. Until Uncle Sam puts his kinetic foot down, Russian Intrusions and campaigns will continue and most likely increase.

big data laptop analytics data science

Leveraging analytics to improve security

Turn big data analytics to provide insight into everything going on within an environment.

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

anti facebook primary
By

Facebook suspends firm that took 50M users' data, says it wasn't a breach

Facebook suspended Trump-linked data firm Cambridge Analytica, which pilfered 50 million Facebook users’ data, claiming the collected personal data was not the result of a breach.

GDPR says you should care, but how you should go about it remains murky at best.

cloud security

Palo Alto Networks buys Evident.io, extends its cloud security solution

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

young man using a laptop with a security display in the background
By

Pwn2Own: Microsoft Edge and Apple Safari fall on day 1

On day one of Pwn2Own, Microsoft Edge and Apple Safari were pwned, and the hack of Oracle VirtualBox was a partial success.

doors choices decisions

Best of breed: how secure are you, really?

If everyone claims to be the best, how can we rationally choose what we will deploy?

hot and cold fire and ice clash temperature

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training.

security vulnerabilities such as hackers and cyberattacks

Vengeance by DDoS: No one is immune

The DDoS attack is showing up as one of the tools used to extract vengeance against companies, organizations, and individuals. Companies need a defense plan.

amdryzen
By

Researchers find 13 critical flaws in AMD's Ryzen and Epyc chips

Researchers accused of ignoring responsible disclosure claim AMD chips are riddled with critical flaws and backdoors; AMD says it is investigating.

vulnerable cryptojacking hacking breach security

Cryptomining: the new lottery for cybercriminals

With more than 500 million PCs actively mining cryptocurrency worldwide, you have to wonder how many compromised websites exist.

monitoring systems

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a...

abstract data stream

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

Load More