• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / DataSecurity Plus / Blog

Mastering cloud app control, Part 3: Governing file transfers

DataSecurity Plus | November 19, 2025

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid...

Mastering cloud app control, Part 2: Hardening login security

DataSecurity Plus | November 12, 2025

Mastering cloud app control, Part 2: Hardening login security

In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized...

Mastering cloud app control, Part 1: Locking down access

DataSecurity Plus | November 3, 2025

Mastering cloud app control, Part 1: Locking down access

When it comes to managing cloud application usage in an organization, the challenges are...

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

DataSecurity Plus | May 26, 2025

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal...

Top tips: 5 potential use cases of 6G networks

DataSecurity Plus | March 6, 2025

Top tips: 5 potential use cases of 6G networks

Top tips is a weekly column where we highlight what’s trending in the tech world and list...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

USB review, Part 2: How to manage USB devices

DataSecurity Plus | March 20, 2024

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of...

USB review, Part 1: How are USB flash drives a security risk?

DataSecurity Plus | January 17, 2024

USB review, Part 1: How are USB flash drives a security risk?

We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

Access granted: Mastering the art of permissions

DataSecurity Plus | October 11, 2023

Access granted: Mastering the art of permissions

Back in the 20th century, cyberattacks were harder to execute because most computers were...

Page 1 of 212»Last »