Data Loss Prevention

Data Loss Prevention (DLP)

hacker presence on a network
Tattered US flag

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

orange monitors with lock icon network security cyber threat

GDPR: Where we were…and where we’re going

It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

root lock

Crestron console service has critical vulnerability

Rapid7 disclosed Crestron flaw that can be used to gain root-level access and give attackers the ability to control commands being executed on the system.

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

submarine periscope 101722825

Chinese hackers stole 614GB of undersea warfare data from U.S. Navy contractor

Chinese hackers reportedly stole hundreds of gigabytes of undersea warfare data from a contractor which works for the U.S. Navy’s underwater weapons R&D center.

rules procedures manuals one way signs

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

six big projects that went open source 1

Rethinking security

6 foundational steps to make your enterprise security program effective.

medical x ray imaging hands

X-ray your SaaS apps to reveal hidden security vulnerabilities

Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

abstract data statistics

The time for network behavior analytics has come

Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

Security flaws in baby cam monitors

Another baby monitor camera hacked

The latest baby monitor hacking incident involves a $34 FREDI wireless baby camera monitor. The hacked device was used to spy on a mother and her baby.

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

NetworkSecurity

IT, OT and IoT: existential technology lifecycle management

If you give companies a way to make more money by making it clear that we only buy products that have been tested, approved and include security maintenance plans, those companies will rise to the occasion and work hard to get your...

globe

Why Africa’s private sector should be concerned about more than the GDPR

The European Union General Data Protection Regulation (GDPR) has generated strong interest in Africa’s private sector. However, the bigger picture shows massive gaps across Africa’s data privacy landscape. This article highlights some...

Movie preview test pattern
Update

Best security software: How 12 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

Load More