Today’s File Security is So ’80s

The complexity of managing enterprise-level file permissions makes it increasingly difficult for security teams to keep track of who has access to what. In this report, Imperva...

Top 10 Indicators of Data Abuse

The threat from insiders is not a new phenomenon, but high-profile incidents have elevated enterprise focus on effective detection and mitigation of insider threats. Detecting...

Top 5 Database Security Threats

Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial...
1 1,452 1,453 1,454 1,455 1,456 1,885