Access your Pro+ Content below.
Cloud DLP rises to the challenge
Monitoring and controlling data that is stored in cloud services and downloaded to devices outside the enterprise network has become critical for CIOs and CISOs in today's environments. To implement effective cloud data loss prevention (DLP), security administrators need to understand which cloud services employees are using and what type of data is being shared, as well as how, when and why this is happening. Unfortunately, for many organizations that's a lot easier said than done. We look at cloud DLP strategies and how new technologies, like cloud access security brokers (CASBs), could offer another layer of protection.
The Cybersecurity National Action Plan, or CNAP, is a continuation of the Obama administration's efforts to increase the federal government's role in cyber regulation and shore up its cyberdefenses. So what does it all mean? The basics that are in the language of the plan, which is not a law, nor is the cybersecurity spending approved by Congress. We look at the dollars and 'sense.'
Like the federal government, many organizations are still in search of effective endpoint and data protection techniques. We continue our Readers' Top Picks series with a look at endpoint protection software. TechTarget polled 700 IT and security professionals at medium-to-large enterprises who told us that they will have active endpoint security projects or technology purchases in the next 12 months. We share the short list compiled from those who indicated plans to invest in endpoint protection software.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Cloud access security brokers are quickly emerging as the technology of choice for enterprises seeking to implement data loss prevention controls in the cloud.
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.
CNAP articulates the right things, as many U.S. government cyber initiatives do, but what has captured the attention of the Beltway is the billion-dollar budget proposals.
Columns in this issue
Data breaches can point to issues with security tools and their implementation. Some companies that are putting personally identifiable information at risk may surprise you.
Orchestration tools and APIs can help enterprises implement threat detection and response functionality in the cloud. But it requires crossing another divide: DevOps and security.