People can sometimes feel overwhelmed when they think about deploying data loss prevention (DLP) at their organization. Some common concerns I hear from prospects are: First I want to classify my data. How can I do that? DLP has many components. Where do I start? I have lots of data – some sensitive, some not. Read more…
Lately, it seems that barely a day goes by when we don’t learn about a major Internet presence taking steps to further erode users’ privacy. The companies with access to our data are tracking us in ways that make Big Brother look like a sweet little baby sister. Typically when we hear an outcry about Read more…
Tags: Consumer, counter identity theft, Cybercrime, Data Protection, Family Safety, malware, McAfee, Mobile, mobile security, personal information protection, scams, social networking, spam
Data classification is an important – and very challenging – problem. It is all about tagging your data so that it can be found quickly and efficiently. It is part of the Information Lifecycle Management process and enables organizations answer the following questions. What data types are available? Where are certain data located? What access Read more…
Tags: Data Classification, Data Protection, DLP, McAfee Data Loss Prevention
First of all, as we are still in time, let me wish you all a healthy, wealthy and Happy New Year! I hope you had a nice and well deserved break after this bumpy year 2011. On my side, I enjoyed a fantastic time skiing with my family in the French Alps. Skiing was great Read more…
Tags: Cyber risks, Cybercrime, Data Protection, Global Risk 2012 report, IT Security market
Current DLP solutions rely on text pattern recognition to detect sensitive data and prevent data loss. But how can that protect images, digital media and other high value assets? If DLP could protect digital media, the 2009 leak of X-Men Origins: Wolverine would not have happened. Adding in a recognizable pattern or watermark is one Read more…
Tags: Data Protection, DLP, intellectual property, IP, McAfee Data Loss Prevention
Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader 9.4.6 and Reader 9.x Versions for Unix. This zero-day vulnerability (CVE-2011-2462) could allow an attacker to execute arbitrary code and silently take the control of a victim’s machine. This flaw is currently Read more…
Tags: Adobe, Data Protection, PDF, Zero-Day
Laptops, desktops, Macs, mobiles, and tablets are on many people’s wish lists this holiday season. Once these shiny new devices are connected to the Internet, they will be under siege by malware created by criminals in order to steal identities. According to a recent McAfee survey, 60% of consumers now own at least three digital Read more…
Tags: Consumer, credit card fraud and protection, Cybercrime, Data Protection, Family Safety, identity protection, personal information protection
Mobile shopping isn’t something I ever thought I’d do. I mean, come on! Why in the world would I use a tiny screen to make big purchases that often require lots of research? But I have found that as I become more dependant on my mobile phone whenever I’m away from my home/office wireless connection, Read more…
Tags: Consumer, credit card fraud and protection, Cybercrime, Data Protection, Family Safety, global threat intelligence, identity theft, personal identity theft fraud
Your Social Security number was never meant to serve the various functions it is used for today. Over the past 70 years, the Social Security number has become our de facto national ID. The numbers were originally issued in the 1930s, to track income for Social Security benefits. But “functionality creep,” which occurs when an Read more…
Tags: counter identity theft, Data Protection, identity fraud, identity fraud scams, identity theft, personal information protection
Many global organizations operate in highly competitive markets, including countries known to aggressively target intellectual property. A significant amount of sensitive information, including intellectual property (IP) resides in enterprise resource planning (ERP) systems such as SAP and Oracle. Traditionally, the security around this information has been limited to the capabilities of the ERP system through Read more…
Tags: Data Protection, DLP, enterprise resource planning, ERP, intellectual property, IP, McAfee Data Loss Prevention, Saviynt Access Manager
Posts tagged under Data Protection