Blog

Blog

IP Theft: Definition and Examples

IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
Blog

Sinovel Fined $1.5M in IP Theft Case

Sinovel, a Chinese turbine manufacturer behind one of the decade's classic insider threat cases, was ordered to pay $1.5M by a federal judge last week for the theft of trade secrets.
Blog

Three Key Challenges Driving the Resurgence of DLP

Why are companies becoming more and more interested in Data Loss Prevention (DLP) solutions? Forrester’s senior analyst, Heidi Shey, explains why a DLP resurgence has occurred in the past few years and mentions some of the key criteria for evaluating DLP Suites.
Blog

How to Evaluate DLP Solutions: 6 Steps to Follow and 10 Questions to Ask

Evaluating and selecting a new solution is always an undertaking, but following a standard framework and criteria set for each solution you’re considering will help simplify the process. Part 10 of our "Definitive Guide to Data Loss Prevention" series provides six steps and ten criteria to guide this process.
Blog

5 Criteria for Choosing the Right Managed Security Services Provider (MSSP)

Organizations can choose to work with an MSSP for several reasons, such as security talent shortages, restricted IT budgets, the complexity of staying on top of sophisticated threats and a bewildering number of technology choices. Part 9 of our Definitive Guide to Data Loss Prevention series provides 5 criteria for selecting the right MSSP for your business.