Get all the facts about these features in our new infosheet. Learn more about how you can leverage Absolute DDS technology to help you regain control over your data.
Where are the biggest gaps in endpoint security models today? This Ponemon study identified three main areas: unprotected mobile devices, the insider threat, and third-party cloud applications.
As the number of endpoints and applications within an enterprise surges, so do the threats. This expanded attack surface has the potential to create millions of potential points of ingress for cyber criminals.
The creation and ultimate effectiveness of the Privacy Shield is a critical element to the future of commercial relationships between the United States and EU.
This week we cover malware spread through social media, phishing scams targeting GoDaddy customers, and why no one gets to go hunting or fishing for awhile in Washington.
Nearly all business cloud applications lack enterprise-grade security and compliance features. This new report analyzed over 108 million documents and 15,000 cloud apps, providing insights into cloud application use.
The vast majority of hospitals and of other healthcare providers say that security is a key business priority. However, healthcare breach numbers are climbing and the costs associated with these breaches are also trending up.
While big breaches grab all the headlines, smaller breaches can cause just as much trouble for those affected.