Companies today are awash in data, but current tools and processes are not enabling them to keep it secure. That's according to Informatica CEO Anil Chakravarthy, whose says his company is embarking on a major push to go further into...
Security researchers have recently highlighted serious risks introduced by the Web Proxy Auto-Discovery Protocol (WPAD), which is enabled by default on Windows and is supported by other operating systems as well.
This is a short, 2-minute, animated video explaining the HPE Security - Data Security approach to data-centric security, the use of HPE Format-preserving Encryption and HPE Secure Stateless Tokenization to protect data at rest, in-use
In this webinar, 1E Technology Architect Mike Terrill and TrueSec Senior consultant Mikael Nystrom discuss expert tips on migrating to Windows 10 in the most secure way. This can be done using 1E's unique technology to automate the
Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.
A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident-response plan so to reduce the impact of that data breach.
This exclusive 1E White Paper will give you a detailed answer to the following questions, What is Device Guard designed to achieve?, What does Device Guard do and how does it do it?, What are the risks of not using Device Guard?, How
In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world.