Data Loss Prevention

Data Loss Prevention (DLP)

Stack of legal documents with compliance and regulatory stamp
microsoft edge browser new size

shadows of team figures collaborating, each holding up gears that work together

Collaborative security

We have far too closed of a mindset when we handle security problems.

blind spot side view mirror car vehicle

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

eye binary IDS Intrusion Detection System

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

anti facebook primary

Facebook is sorry for text spamming 2FA users, blamed it on a bug

Facebook claimed a ‘bug’ was responsible for sending text spam to phone numbers provided by 2FA users.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

11 victims

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

5 fumbling dumb mistake

Dear IT security pros: it's time to stop making preventable mistakes

Examining commonalities: shared strategies or mistakes across multiple cybersecurity incidents.

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

cloud security ts

How machine learning is shaping the next generation of cloud security

Security solutions must pivot in order to protect organizations as they move to the cloud.

Dislike! Social media addiction

Facebook's free VPN acts like spyware to iOS users in the U.S.

Facebook's new VPN service for iOS users in the U.S. claims to provide security protections, but it also tracks users -- collecting mobile data traffic.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

Man pointing to security icon for email

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

cloud security lock

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

Load More