Quantcast
Channel: FedTech Feed: Data Loss Prevention
Browsing all 112 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Bad User Experience: Another Form of Vulnerability

By Rob JoyceMaking security too difficult for users can hamper information assurance, so finding a balance is important.

View Article



Image may be NSFW.
Clik here to view.

Data Loss Prevention: How to Stop Inside Jobs

By Alan JochNew data loss prevention solutions target internal security threats to sensitive and valuable information.

View Article

Image may be NSFW.
Clik here to view.

Strategies for Preventing a Data Breach

By Joel SnyderFollow these tips to maintain control of mission-critical information.

View Article

Image may be NSFW.
Clik here to view.

Locking Down BYOD

By Karen D. SchwartzAgencies find ways to accommodate employees’ personal devices on federal networks.

View Article

Image may be NSFW.
Clik here to view.

Firewall Rule Management Is the Key to Network Security

By Mike ChappleFollow these best practices to more effectively manage firewalls and improve security.

View Article


Image may be NSFW.
Clik here to view.

Why Cybersecurity Is So Important in Government IT [Infographic]

By Anita FerrerOngoing threat requires ongoing attention and investment.

View Article

Image may be NSFW.
Clik here to view.

How the Health and Human Services Department Addressed Data Loss Prevention

By Centralized security helps HHS prevent data loss.

View Article

Image may be NSFW.
Clik here to view.

Automatic or Manual: An Explanation of Two Types of Remote Wiping

By FedTech StaffMDM software is vital for the success of BYOD programs in government.

View Article


Image may be NSFW.
Clik here to view.

How to Defend Against Evolving Threats

By Karen ScarfoneFocusing on securing devices is insufficient — agencies must also take steps to secure their data.

View Article


Image may be NSFW.
Clik here to view.

The State of information Security in the Federal Government

By FedTech StaffAn increasing dependence on technology is putting sensitive data and critical systems at risk.

View Article

Image may be NSFW.
Clik here to view.

How Enterprise Security Operations Centers Strengthen Agencies’ Cyberdefenses

By Wylie WongStandardizing security protocols across the enterprise helps government keep data safe.

View Article

Image may be NSFW.
Clik here to view.

11 Concerning Cybersecurity Stats About the Federal Government

By Jimmy DalyMeriTalk’s latest survey indicates that noncompliance is a key security issue.

View Article

Image may be NSFW.
Clik here to view.

How to Help DLP and Encryption Coexist

By Karen ScarfoneLearn where to incorporate data loss prevention technologies on encrypted networks.

View Article


Image may be NSFW.
Clik here to view.

What Is DLP Anyway?

By Joel SnyderData loss – or leak -- prevention is an art more than a science. Follow these steps to keep data safe.

View Article

Image may be NSFW.
Clik here to view.

The Case for Professionalizing Cybersecurity

By Franklin S. ReederNow is not the time to hold back on training workers to protect critical systems.

View Article


Image may be NSFW.
Clik here to view.

Symantec Details the Latest Threats to Government Cybersecurity

By Morgan LittleThe 2014 Internet Security Threat report shows just how vulnerable agencies are.

View Article

Image may be NSFW.
Clik here to view.

How Many Layers Does Your Security Solution Protect? [#Infographic]

By It’s not just about breaching the front gates, but also about protecting the kernel.

View Article


Image may be NSFW.
Clik here to view.

How the Cybersecurity Framework Affects Government

By Leon ErlangerDesigned to protect infrastructure, NIST’s framework stands to impact agencies, too.

View Article

Image may be NSFW.
Clik here to view.

Warning: You May Have Already Been Hacked

By Nicole Blake JohnsonOne senator is requesting FBI data to determine which federal agencies have not fallen victim to hackers.

View Article

Image may be NSFW.
Clik here to view.

Are You Putting Your Agency’s Networks at Risk?

By Nicole Blake JohnsonAnswer these 12 short questions to find out if you’re opening your organization up to potential vulnerabilities. 

View Article
Browsing all 112 articles
Browse latest View live




Latest Images