Data Loss Prevention

Data Loss Prevention (DLP)

Microsoft Windows 10 logo bandage data map

What’s new in Windows 10 security features: The anti-ransomware edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for 1709, Fall Creators Edition.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

Equifax credit bureau logo and building security breach

Equifax hackers may have stolen more data than originally revealed

A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers.

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

alert hacking threat detected

How to automate threat hunting

The quest for hidden threats...

stretched money budget

11 tips for prioritizing security spending

How to keep things locked down when you can't afford new locks.

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

network security digital internet firewall binary code

Defending outside the firewall

The risks and rewards of the intelligent edge.

cool cat with sunglasses independent

3 reasons why security automation is as cool as blockchain

When security teams take advantage of automation, they can rapidly triage alerts, investigate incidents, contain threats, and protect their companies and customers faster than ever before.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

businessman looking through binoculars future vision prediction

The future: it ain’t what it used to be

The problem with the future—as baseball legend Yogi Berra, the founders of the internet and any CISO or CTO can assure you—is that, increasingly, it ain’t what it used to be.

Smart city internet of things with security camera

Identity and the smart city

IAMs next big outing.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

nup 177120 0001

How the International Olympic Committee can win gold in cybersecurity

While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

man asleep at desk

Becoming vulnerability agnostic

Don't let the constant barrage of vulnerability announcements play with your emotions and drive up your stress levels.

steal theft hacker crime laptop firewall

3 leaked NSA exploits work on all Windows versions since Windows 2000

The EternalSynergy, EternalRomance, and EternalChampion exploits have been reworked to work on all vulnerable Windows versions: Windows 2000 -- Server 2016.

security internet network encryption privacy padlock

How to speed up security tool evaluation and deployment

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

man whispering

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point...

Load More