Blog

Blog

What is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
Blog

The History of Data Breaches

As the wave of data breaches continues to crash down on companies, let’s take a look back at some of the largest and most damaging data breaches on record. Read on for a historical walk through breaches over time as well as resources for preventing data breaches.
Blog

Sinovel Fined $1.5M in IP Theft Case

Sinovel, a Chinese turbine manufacturer behind one of the decade's classic insider threat cases, was ordered to pay $1.5M by a federal judge last week for the theft of trade secrets.
Blog

Three Key Challenges Driving the Resurgence of DLP

Why are companies becoming more and more interested in Data Loss Prevention (DLP) solutions? Forrester’s senior analyst, Heidi Shey, explains why a DLP resurgence has occurred in the past few years and mentions some of the key criteria for evaluating DLP Suites.
Blog

High Drama in HIPAA Land: the CoPilot Breach

The leak late last year of information on more than 200,000 patients of CoPilot Provider Support Services was just the first act in what is proving to be a bizarre and mysterious HIPAA ‘whodunnit.’
Blog

HIPAA Hits the Cloud

New guidance from the Office of Civil Rights makes clear: HIPAA’s privacy protections extend to cloud providers, too.
Blog

How to Evaluate DLP Solutions: 6 Steps to Follow and 10 Questions to Ask

Evaluating and selecting a new solution is always an undertaking, but following a standard framework and criteria set for each solution you’re considering will help simplify the process. Part 10 of our "Definitive Guide to Data Loss Prevention" series provides six steps and ten criteria to guide this process.
Blog

5 Criteria for Choosing the Right Managed Security Services Provider (MSSP)

Organizations can choose to work with an MSSP for several reasons, such as security talent shortages, restricted IT budgets, the complexity of staying on top of sophisticated threats and a bewildering number of technology choices. Part 9 of our Definitive Guide to Data Loss Prevention series provides 5 criteria for selecting the right MSSP for your business.