The costs of data breaches have increased significantly over the past couple of years. These five
tips will help your organization implement a comprehensive data protection program and better
manage the risks of data loss and theft.
...
You Are Browsing ‘White Papers & Webcasts ’ Category
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where i...
Encryption solutions are a key component of data protection and are part of Intel Security protection suites. These capabilities include drive encryption, file and removable media protection, and management of native encryption. This paper introduces Intel Security endpoint encryption solutions to protect valuable corporate data on user devices and shared servers.
...
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
...
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. This malware allows complete control of infected systems through a command-based backdoor operated by the control server as well as a virtual network computing-based backdoor. Pinkslipbot can also spread to other systems within the environment through network shares and can communicate to its control server to download updated versions o...
Organizations are looking to embed security into the culture and enterprise architecture of the business to ensure its resilience for the long term and reap the benefits of the current revolution. Building a strategy for resilience by growing capability towards a trusted level will help ensure sustained business continuity in the face of any threat.
...