Resources

Blog

What Is Content Inspection?

Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Blog

Terabytes of Data Stolen? The Lessons of Operation Iron Tiger

A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
Blog

Compromising Emanations

Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.
Blog

What Is Personally Identifiable Information?

Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
Blog

5 Steps to Prevent Sensitive Data Loss

Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?
Blog

What is NIST Compliance? (Checklist, Definition, & More)

The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high tech industries today.
Blog

Six Questions about Application Whitelisting & Advanced Threats

Learn more about app whitelisting in a short question and answer session with Chris Sherman of Forrester and John Fox of Digital Guardian. This Q&A was taken from our webinar, “Why Application Whitelisting is Essential for Advanced Threat Defense.”