DLP Software
DLP Software | News, how-tos, features, reviews, and videos
Sinovel Wind Group found guilty of IP theft, fined $1.5 million
While American Superconductor's data logs and stores were helpful in convicting Sinovel Wind Group of IP theft, a data loss prevention strategy could have identified the thieves' activities sooner.
When an insider rides Pegasus into the dark web
An NSO Group employee, who'd worked there for only about 90 days, copied the company's Pegasus software and offered it for sale on the dark web for $50 million.
What is corporate espionage? Inside the murky world of private spying
Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.
CIA contractor secretly hoards his classified work
Former CIA contractor Reynaldo Regis pled guilty to keeping secret notebooks of his work within the CIA from 2006-2016 and storing the notebooks in his home.
Chinese citizen tries to steal advanced robotic technology IP
Medrobotics' CEO caught Dong Liu in the company's conference room attempting to steal advanced robotic intellectual property.
The biggest security startup deals of 2018 (so far)
Recent VC investment in cybersecurity has tended to favor companies applying machine learning techniques to security problems. Here are some of the largest dealmakers that will be bringing you the next wave of security technology.
Apple means business when protecting intellectual property
Apple takes the protection of intellectual property very seriously. In 2017, it says 27 people were caught and 12 arrested for revealing inside information.
GDPR-defined personal data can be hard to find—here's where to look
The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked.
Hottest cybersecurity products at RSA 2018
Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.
Why organizations need business-centric data protection
A data protection team can help your enterprise take the best steps towards reducing the business risks and data breaches.
GDPR: end user data loss prevention
The EU’s GDPR comes into force in May, bringing huge changes to data protection rules. But the risks are far wider than first thought. Without next generation technical solutions to support policies, enterprise data is not the only...
RSA Conference: CISOs' top 4 cybersecurity priorities
When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters.
Is it time to unify endpoint management and security?
Modern unified management makes sense, and the industry is reacting by providing solutions. The question is whether enterprise organizations will use them.
Beware the GDPR vaporware
NetApp’s legal head Sheila FitzPatrick on why companies can’t simply buy or outsource their way to GDPR compliance.
When employee access exceeds trust, IP goes missing
Companies may be tempting fate by giving interns deep access to company data, as these two examples of intellectual property theft show.
Detecting malicious insiders: a new use case for data loss prevention
A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.
7 threat modeling mistakes you’re probably making
Threat modeling is a process for identifying and addressing security risks, but the relative lack of maturity around the practice can cause big problems for organizations seeking to adopt it.
Data breach fatigue requires better response planning
Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.
Of clouds and compliance: DLP + UEBA are back in the spotlight
Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...
Why staging a fake attack is only real thing to keep you secure
How the Napa County fires opened my eyes to the readiness - or lack thereof - most of us are to a real disaster, physical or digital.