Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we’ll...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities
In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion
What do Morgan Stanley, Samsung, and a New York credit union all have in common? They aren’t of the same scale, do not cater to...
Data classification: The fundamental requirement of successful DLP programs
The way we store data has undergone a dramatic shift. From good ol’ floppy disks to today’s cloud storage solutions, advancements in storage have slashed costs...

Data security threats: How to safeguard your data from modern pirates [Free e-book]
To stay safe from modern-day pirates, you need elaborate, multi-layered security measures. With the recent exponential increase in data generation and storage requirements, threats to...

USB review, Part 2: How to manage USB devices
In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...

USB review, Part 1: How are USB flash drives a security risk?
We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied...

Is your sensitive data overexposed?
76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...