Alle Veröffentlichungen anzeigen

Inhaltsfilterung:

Hide English Publications

Automation and Analytics versus the Chaos of Cybersecurity Operations (English)

Learn what high performing security organizations are doing to make measurable improvements in their cybersecurity analytics and operations architecture.

Petroleum Refiner Overhauls Security Infrastructure (HollyFrontier) (English)

A petroleum refiner updated its security infrastructure with integrated McAfee solutions, transforming its ability to defend against cyberthreats and benefitting from simplified management, stronger protection, and faster detection and correction.

5 Tips to Help Protect Your Data (English)

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

5 Tips to Help Protect Your Data (English)

With the number of breaches continuing to grow year after year, cyberattacks seem to be an ongoing fact of modern life. Risk is everywhere and the key is managing it. So the next step is to act on this information, specifically to move from passive monitoring to more protective blocking of sensitive and confidential data. We have identified five tips, based on real-world deployments and experience, that will enhance your data loss prevention (DLP) implementation.

Building Trust in a Cloudy Sky (English)

We surveyed over 2,000 professionals for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of cloud adoption and security.

Building Trust in a Cloudy Sky (English)

We surveyed over 2,000 professionals for our annual cloud security research study. The results in this report offer a detailed understanding of the current state of cloud adoption and security.

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection (English)

Key findings on data exfiltration and recommendations on data loss prevention

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection (English)

Key findings on data exfiltration and recommendations on data loss prevention

Tackling Insider Threats (English)

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.

Tackling Insider Threats (English)

Insiders are responsible for almost as many losses, breaches, and thefts of sensitive and confidential data as cybercriminals. This white paper shows you how to combat this problem through a system of data classification, policy development, and incident response, backed by a strong set of data loss prevention tools.