Strengthening Your Human Firewall through Ongoing Security Training and Guidance
Educating end users is a process, not an event
Five Devastating Hacks That Predate Sony
Sony Pictures Entertainment is the most recent and, perhaps, the highest-profile victim of what might be considered a “Category 5” hack. But it’s hardly the only company to get digitally pants’d by hackers. Here is a list of some other notable victims and details of how they got hacked.
What is Data Governance? Data Protection 101
Data Governance defined in Data Protection 101, our series covering the fundamentals of information security.
The CISO’s Guide to Data Loss Prevention: DLP Strategy Tips, Quick Wins, and Myths to Avoid
The definitive guide to developing and deploying data loss prevention strategy, from tips for quick wins to DLP software and tools.
It Isn’t All About You – 5 Takeaways from Forrester’s “Zero Trust Approach” Report
Where can you find a good framework for designing and implementing data-centric security?
Poor Security on Display at Sony as Gigabytes of Data take Wing
Revelations this week about the extent of the breach at Sony Pictures Entertainment should scare the pants off corporate America.
Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach
The majority of successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach.
What is Endpoint Protection? Data Protection 101
Endpoint protection defined in the first installment of our Data Protection 101 series.
Data-centric Security for Healthcare Compliance
Focusing security efforts on sensitive data to meet healthcare regulatory requirements
Sony Pictures Hacked, Blackmailed by Attackers
Are we doomed to be victims of these attacks forever or can something really be done to prevent them?
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!