Information Security Leader, Author, Instructor and Speaker

Default utility Image

4 Ways to Keep Sensitive Data from Escaping to the Public Cloud TAGS: | Think about how many cloud services you use every day. Chances are that it’s a mixture of services managed by your employer and others …Continue reading →

Default utility Image

4 Ways Data Loss Prevention Tools Fit Right into Layered Security Strategies TAGS: | Cybersecurity pros often follow a defense-in-depth strategy, acknowledging the fact that controls will fail. Layered defenses are especially important in …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

5 Security Must-Knows for Windows 10 TAGS: | | | Microsoft’s September release of the Windows 10 operating system caused a flurry of media activity centered around security and privacy …Continue reading →

Default utility Image

Data Loss Prevention and the Financial Firm TAGS: | The financial industry runs on sensitive information.  From confidential customer information and payment card account numbers to sensitive financial analyses, …Continue reading →

Default utility Image

Data Loss Prevention TAGS: | IT executives around the world know the sinking feeling that occurs when a security manager shows up in the doorway …Continue reading →

Default utility Image

White Paper: Risk Assessment and Data Loss Prevention TAGS: | Cloud computing, virtualization, social networking, mobility, peer-to-peer computing: Although these terms spark innovative ideas in many parts of an organization, …Continue reading →