DATA EXFILTRATION

Email … Still the Most Common Threat Vector

In shocking findings, the majority of cybersecurity professionals admit they are not confident in their ability to prevent data loss. … Read More

62 percent of organizations not confident they can prevent data loss

In shocking findings, the majority of cybersecurity professionals admit they are not confident in their ability to prevent data loss. … Read More

UBA, ITM and Enterprise DLP

User Behavior Analytics, or UBA, is one of the most important developments in digital data protection to emerge in the past several years. UBA is an advanced cybersecurity process designed to detect insider threats, primarily those connected to targeted attacks, … Read More

Gain Control of Your Unstructured Data On-Premises and in the Cloud

Gain Control of Your Unstructured Data On-Premises and in the Cloud   When it comes to data security, enterprises face a major challenge when it comes to preventing data loss.  The nature of administering a large firm today means sharing … Read More

What is Software defined perimeter and Zero Trust

What is Software-defined perimeter and Zero Trust? In the digital age, experts are constantly on the search for the best model of information security. While most improvements constitute tweaks or upgrades to existing paradigms, some designs have required a complete … Read More

Badmouthing Data Loss Prevention (DLP) is Fashionable

Badmouthing Data Loss Prevention (DLP) is Fashionable   Is DLP Really Dead?   I recently came across several digital security vendor sites who describe themselves as a “DLP alternative.” Perusing through their pages, I came across comments such as “DLP … Read More