Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

How to reduce losses caused by theft at POS

Retailers can take steps to try to prevent or at least reduce losses due to theft at point of sale (POS) and shrink.

coupons

Report: Strategic data analytics can reduce shrinkage

Strategic data analytics can reduce shrinkage for retailers, restaurants and manufacturing companies by helping loss prevention pros use early warning indicators to stop problems before they start

retail theft

Cost of retail crime skyrockets nearly 30 percent

Higher proportions of employee theft and shoplifting as a share of all retail losses, combined with higher spending on loss prevention, resulted in a 27 percent increase of the cost of retail crime in the United States, according to...

Why retailers like Home Depot get hacked

Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say.

Why physical security (and InfoSec!) still matter

In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec

Dragon NaturallySpeaking 13 office man image

Is the open floor plan trend a data security headache?

Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits

Turning your security strategy inside out: The convergence of insider and advanced threat

Jason Clark and James Robinson of Accuvant discuss how security leaders can think outside the box when developing or revisiting their insider threat strategies.

computer hacker computer crime crime identity theft criminal technology cyber crime 000000098471

Ideas for defending against cyberespionage

Russian hackers who broke into the networks of Western oil and gas companies used techniques that companies can detect and oftentimes defend against, experts say.

cloud security

Warning signs corporate computers could be talking to cloud-based malware

The recent discovery of command-and-control software sending instructions to malware-infected computers from Dropbox raises the question of how such threats can be discovered.

security checkpoint

Culture clash: How physical security is impacted by cultural norms

Culture, of all things, can affect the strength of physical perimeter security, for better or for worse. We offer a look at what is and isn't working overseas, and why

hotelkeycard

Hotel Security: Navigating concerns and identifying solutions

Business and recreational travelers demand safe and secure hotel accommodations, as well as responsive and friendly customer service. How can hoteliers ensure both expectations are met?

moviesec

8 security hits and misses on the silver screen

Security has played a bigger role in cinema than you may think

Facebook experiment helps battle man-in-the-middle attacks

Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data.

Facebook grad

Facebook experiment helps battle man-in-the-middle attacks

Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data.

Up in smoke: How marijuana shops in Colorado are protecting themselves from losses

The moment I walk into the 3D Cannabis Center in Denver, Colorado, I'm approached by a security guard, taser on his hip, who requests my identification. As I fumble around in my wallet for my driver's license, I take a look around...

3dweedroom

6 ways a marijuana shop secures its premises

With retail marijuana shops unable to do business with banks, store owners are implementing stringent security measures to protect their cash, their product, and their employees. Here's how one store -- 3D Cannabis Center in Denver,...

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"

5 Ways to Prevent Data Loss in Mobile Environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing...

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

7 strategies for a successful DLP deployment

Investing in DLP technology can be costly and time consuming. Sapient's CISO Curtis Dalton offers tips on starting slow for an effective plan

Load More