Blog

Blog

Positioning DLP for Executive Buy-In

Data protection projects involve several departments within an organization, from IT to marketing. Learn how to build allies and properly position DLP to decision makers in part 8 of our series, The Definitive Guide to DLP.
Blog

Building a value-based business case for DLP

You understand the need for data protection, but how do you pitch that idea internally to get the political and financial support that you need? The key to making a value-based business case lies in positioning DLP initiatives in terms that executives will understand. Learn more in part 7 of our Definitive Guide to Data Loss Prevention series.
Blog

All Trends Lead to Data-Centric Security

As traditional approaches to security become less effective, enterprises are shifting towards a security model that focuses on data protection at its core. Learn more about this shift to data-centric security in part five of our series, The Definitive Guide to Data Loss Prevention.
Blog

Debunking the Three Myths of DLP

With data loss prevention back in the limelight, there are a few myths that we’d like to dispel in part three of our Definitive Guide to DLP series.
Blog

What Is Cloud DLP?

Learn more about how data loss prevention solutions are evolving to protect sensitive data in the cloud.
Blog

4 Steps to Keeping Patient Data in the Cloud Protected

Once patient data has been migrated to the cloud securely, it will require ongoing protection against loss or unauthorized access. Follow these four steps to keep cloud-based data protected in an ongoing basis.
Blog

Terabytes of Data Stolen? The Lessons of Operation Iron Tiger

A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
Blog

5 Steps to Prevent Sensitive Data Loss

Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?