Google Chrome 68 Changes and Their Impact on Data Protection
Google announced in November last year that they planned to make changes to Chrome to improve stability of their browser,...
An Unmatched Customer Experience
I’ve been in this industry for over twenty years, and the advancements in cybersecurity over the last few years are...
The perimeter has changed, so should you
People have wandered a long way outside of the secure walls of corporate computing. Your users are working from more...
Looking for a UEBA Solution? Here Are Some Key Considerations Before You Buy
As you begin mapping out your security defense strategy for 2017, you’ve undoubtedly seen a relatively new acronym on your...
Another Reminder to Not to Let Your Data Guard Down
This blog was written by Ben Cody. If anything has been proven in recent years, it’s that you don’t have...
Could a DNC Data Leak Alter a Presidential Campaign?
This blog post was written by Teresa Chen. If you’re a political junky, there’s no lack of intriguing stories and...
Berkshire Health Systems Adopts Protect-Detect-Correct Strategy With McAfee
Paul Doucette, the senior technical security engineer at Berkshire Health Systems, thrives on challenge. “Our biggest security priority is protecting...
How Is Your Data Getting Out?
It’s 11:00 p.m. Do you know where your data is? Most reports on data theft events concentrate on how the...
Building and Using Your Network of Informants
If you are working in law enforcement, having a network of informants is both a blessing and a curse. A...
Securosis White Paper: Implementing and Managing a DLP Solution
Chapter 4: “Managing Your Data Loss Prevention Solution” Congratulations on a successful DLP deployment and configuration! If your policies and...
- 1
- 2