What is Application Whitelisting? (Definition & Tips)
Application whitelisting defined, how application whitelisting works, and more in Data Protection 101, our series on the fundamentals of data security.
Application whitelisting defined, how application whitelisting works, and more in Data Protection 101, our series on the fundamentals of data security.
#TBT: While reviewing our content for 2015 planning we uncovered a gem – the 2006 corporate video for Verdasys/Digital Guardian.
Research from Fujitsu finds that users who are more confident of their IT skillz are also more likely to be the source of a data breach.
New Report from the Federal Trade Commission Presents Key Findings from 2013 IoT Workshop
Insider threat defined in Data Protection 101, our series on the fundamentals of data security.
The highly anticipated State of the Union address has come and passed, leaving us with promises for bolstered cybersecurity at the government level.
Minecraft is the latest company to be wrongfully accused of losing control of customer data. The real culprit: users, themselves.
Be sure to sign up for our January webinar on how to quickly deploy a robust data protection program. You’ll learn how Jabil, a US-based global manufacturing company with over 175,000 employees worldwide, deployed a data protection program to over 40,000 users in less than 120 days.
When scandals roil Wall Street or Corporate Boards, federal regulations soon follow. Five years into our data theft epidemic, however, there’s still no law demanding accountability for information security.
With his State of the Union address rapidly approaching, President Obama has started to discuss cybersecurity proposals that bode well for the industry.