• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:Deepshika Kailash

  • Deepshika Kailash
    Deepshika Kailash
    USB review, Part 2: How to manage USB devices

    DataSecurity Plus | March 20, 2024

    USB review, Part 2: How to manage USB devices

    In this two-part series, the first blog demonstrates how USB devices can be conduits of...

    USB review, Part 1: How are USB flash drives a security risk?

    DataSecurity Plus | January 17, 2024

    USB review, Part 1: How are USB flash drives a security risk?

    We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

    Threat detection review: Insider threats in cybersecurity

    ADAudit Plus | January 16, 2023

    Threat detection review: Insider threats in cybersecurity

    Globally, 67% of companies experience between 21 to 40 insider-related incidents per year...

    Bring down data storage costs by getting rid of obsolete data [Savings estimator]

    DataSecurity Plus | November 11, 2021

    Bring down data storage costs by getting rid of obsolete data [Savings estimator]

    Redundant, obsolete, and trivial (ROT) data refers to information housed in data...