We are increasingly being asked this question from organizations – companies looking for best practice to preserve information that has value, along with enforceable practices to get rid of that which does not.
The 2015 SC Magazine Awards announced Proofpoint as the winner of the Customer Service Excellence in IT Security companies.
As marketing teams find success building corporate social media programs– they are unintentionally creating risks for their peers in the Compliance department. The average Fortune 100 has over 320 branded social accounts with over 200,000 followers and 1500 employee participants. The firm is re
When cyber criminals strike, they go out of their way to hide actions, misdirect investigators, and even evade detection tools. Often, security teams start the incident response process in the dark, with little more than source and destination IPs, a category, and a proposed severity.
IT needs to address security gaps in the platform before getting buy-in from interested parties
(Following-up on the Financial Services Info Chaos post from last week )
Walking through downtown Palo Alto for lunch last week I noticed something a bit strange. Restaurants and cafes were strangely quiet. VCs, techies, and students were all focused on the big screens. Not watching a Cardinal game or talk show or The Price is Right.
Data breaches garnered a lot of media attention in 2014, and so far that momentum has carried forward into 2015.
We recently announced the Nexgate Social Threat Center, a real-time social media security operations console.
In other poorly timed news, the US State Department’s Office of Inspector General (OIG) released a report this week detailing the agency’s poor email management practices and general State of Departmental Confusion regarding business