Data loss prevention News
June 29, 2017
Ransomware attacks have grown to such a scale, companies are getting attacked more than once. Endpoint data protection vendor Druva recently surveyed 832 IT professionals worldwide during May and ...
February 28, 2017
Digital rights management (DRM) capabilities are often embedded in third party software products via partnerships agreements. One DRM supplier, Seclore, has made such OEM relationships its main ...
January 12, 2017
A quiet AWS acquisition last year could improve customers' ability to detect and respond to cyberattacks at scale through automation and machine learning.
October 20, 2016
A more affordable Workspace One bundle with less advanced management capabilities could appease IT pros who view workspace suites as too pricey.
Data loss prevention Get Started
Bring yourself up to speed with our introductory content
When backing up to the cloud, it's important to take precautions against data loss. See how approaches like redundancy can bolster your backup strategy. Continue Reading
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.
Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.
In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.Continue Reading
Evaluate Data loss prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In the world of cloud data storage, one would think everything is locked down. Nope, it's still up to you. Microsoft offers admins some unified security tools to make it happen. Continue Reading
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
The path to Office 365 is easier if you're on Exchange 2016, which brings cloud integration features that benefit users and administrators alike. Continue Reading
Manage Data loss prevention
Learn to apply best practices and optimize your operations.
Microsoft offers tools in Office 365 to help administrators manage complicated data compliance regulations. These features can protect the business. Continue Reading
Healthcare cybersecurity expert John Nye shares what technologies he recommends that healthcare organizations can use to fight against insider healthcare security threats. Continue Reading
Corporate databases are inviting targets for attackers looking to steal the data they contain. A well-planned database security strategy can help avoid data breaches. Continue Reading
Problem Solve Data loss prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A ransomware attack is not your typical data loss event. Some data protection vendors get the picture and are incorporating ransomware-specific features in their products. Continue Reading
Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it. Continue Reading
Database administrators are usually concerned with backing up their databases. But they should spend more time focusing on database recovery as part of the backup process. Continue Reading