What is Device Control? A Device Control Definition
Learn about device control technology and how to implement device control solutions in your security program.
What is Email Encryption? (Definition, Best Practices & More)
Email encryption defined in Data Protection 101, our series on the fundamentals of data security.
What is Data Exfiltration? (Definition & Prevention)
Learn more about data exfiltration and methods for preventing data loss in Data Protection 101, our series on the fundamentals of data security.
What is PCI Compliance? 12 Requirements & More
Learn about The Payment Card Industry Data Security Standard requirements and the independent body, PCI Security Standards Council, that manages and enforces the PCI DSS.
What is Application Control? Definition, Best Practices & More
What is Application Control?
Application control is a security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk. The control functions vary based on the business purpose of the specific application, but the main objective is to help ensure the privacy and security of data used by and transmitted between applications.
Application control includes completeness and validity checks, identification, authentication, authorization, input controls, and forensic controls, among others.
What Is Data Encryption? (Definition, Best Practices & More)
Data encryption defined in Data Protection 101, our series on the fundamentals of data security.
101 Data Security Tips: Quotes from Experts on Breaches, Policy, News & More
Get 101 data security tips on mobile security, password security, secure browsing and more.
What is Application Whitelisting? (Definition & Tips)
Application whitelisting defined, how application whitelisting works, and more in Data Protection 101, our series on the fundamentals of data security.
What is an Insider Threat? An Insider Threat Definition
Insider threat defined in Data Protection 101, our series on the fundamentals of data security.
What is Endpoint Detection and Response (EDR)?
Endpoint Detection and Response defined in Data Protection 101, our series on the fundamentals of data security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!