What Is Personally Identifiable Information?
Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
How to Hire & Evaluate Managed Security Service Providers (MSSPs)
We asked a panel of data security professionals to provide expert recommendations for hiring MSSPs. See what the experts had to say.
5 Steps to Prevent Sensitive Data Loss
Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?
Email Blunder Exposes Identity of 780 HIV Patients in the UK
Healthcare organizations face a myriad of security threats. But the news this week about a UK clinic exposing the identities of 780 HIV positive patients was a purely self-inflicted wound.
Is Ashley Madison Membership Really Still Growing?
The company’s latest statement claims that hundreds of thousands of new users to continue to sign up each week. Are these numbers valid?
What is Incident Response? (Definition & 6 Steps to Take)
Six steps for effective incident response.
Solving the Endpoint Security Epidemic: A Data-Aware Approach
In today’s business environment, the most effective way to keep company information secure is to focus on protecting the data itself, not the ever growing number of endpoint devices used to access it.
What is NIST Compliance? (Checklist, Definition, & More)
The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high tech industries today.
5 Cybersecurity Issues to Avoid
Avoid these common pitfalls to increase the efficacy of your cybersecurity efforts without incurring additional costs or technological requirements.
Six Questions about Application Whitelisting & Advanced Threats
Learn more about app whitelisting in a short question and answer session with Chris Sherman of Forrester and John Fox of Digital Guardian. This Q&A was taken from our webinar, “Why Application Whitelisting is Essential for Advanced Threat Defense.”
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!