Information Security Leader, Author, Instructor and Speaker

Default utility Image

4 Ways Data Loss Prevention Tools Fit Right into Layered Security Strategies TAGS: | Cybersecurity pros often follow a defense-in-depth strategy, acknowledging the fact that controls will fail. Layered defenses are especially important in …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

What Security Vulnerabilities Should Be Fixed First? TAGS: | | Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →

Default utility Image

Data Loss Prevention and the Financial Firm TAGS: | The financial industry runs on sensitive information.  From confidential customer information and payment card account numbers to sensitive financial analyses, …Continue reading →

Default utility Image

Data Loss Prevention TAGS: | IT executives around the world know the sinking feeling that occurs when a security manager shows up in the doorway …Continue reading →

Default utility Image

Webcast: Content Monitoring in the Enterprise TAGS: | | | From data loss prevention to database activity monitoring and digital rights management, there are a bewildering variety of technologies available …Continue reading →

Default utility Image

Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise TAGS: Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that …Continue reading →

Default utility Image

Metadata security and preventing leakage of sensitive information TAGS: | Most security professionals know metadata often contains sensitive information about documents hidden from obvious view, but easily extracted with the …Continue reading →

Default utility Image

How to Develop a Sound Data Loss Prevention Strategy TAGS: No matter what your line of business, you no doubt have some data in your possession that’s critical to you, …Continue reading →

Default utility Image

What Your Business Can Learn from WikiLeaks TAGS: | Earlier this year, the actions of a 22-year-old brought WikiLeaks, a previously obscure website, into the public spotlight. Pfc. Bradley …Continue reading →