• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:datasecurity

A primer on homomorphic encryption

General | December 3, 2024

A primer on homomorphic encryption

For any company in the IT industry, it is virtually impossible to function unless a lot...

Top tips: Watch what you eat!

General | November 28, 2024

Top tips: Watch what you eat!

Top tips is a weekly column where we highlight what’s trending in the tech world and list...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Firewall Analyzer | August 14, 2024

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications...

Top tips: Benefits of data backup and recovery

General | March 28, 2024

Top tips: Benefits of data backup and recovery

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

USB review, Part 1: How are USB flash drives a security risk?

DataSecurity Plus | January 17, 2024

USB review, Part 1: How are USB flash drives a security risk?

We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

Top tips: 4 hacks you should try now to keep your text messages secure

General | December 7, 2023

Top tips: 4 hacks you should try now to keep your text messages secure

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

Access granted: Mastering the art of permissions

DataSecurity Plus | October 11, 2023

Access granted: Mastering the art of permissions

Back in the 20th century, cyberattacks were harder to execute because most computers were...

Comply with India's Digital Personal Data Protection Act using Endpoint Central

Endpoint Central | September 11, 2023

Comply with India's Digital Personal Data Protection Act using Endpoint Central

Many countries across the globe are realizing the importance of the right to privacy in...

Why are passwords so difficult to remember?

General | April 28, 2023

Why are passwords so difficult to remember?

We all have a lot of passwords to keep track of on a daily basis, whether they're for...

Page 1 of 34712»Last »