Definitions, challenges, and implementation tips from the trenches. [PDF] Over the last few years, you’ve heard a lot from information executives, consultants and vendors about data loss prevention, an emerging discipline that aims to keep business-critical, private information from falling into the wrong hands. If it’s all left you scratching your head, there’s a reason. Businesses are looking for a way to prevent the loss of data, conceptually, while vendors are offering the acronym-friendly Data Loss Prevention (DLP). The disconnect between the two things has led to a fair amount of confusion.There are subtle but critical differences between the prevention of data loss, a business imperative, and DLP, the product set. DLP tools, implemented correctly with the right processes in place, can indeed help prevent the loss of data. Buying and installing DLP, however, isn’t as simple as some marketers would like you to believe, nor is it ever a goof-proof process. This executive guide, based on research done by CSO Magazine and CSOonline.com, is intended to help you make sense of DLP, the tools, while figuring out the best way to actually help your organization from losing data.Click on this link to download The Executive Guide to DLP (PDF format): Related content news Researcher discovers exposed ServiceBridge database Over 31 million documents from the field service management provider were left open to the internet. By Howard Solomon 26 Aug 2024 4 mins Data and Information Security feature Is the vulnerability disclosure process glitched? How CISOs are being left in the dark Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports. By Cynthia Brumfield 26 Aug 2024 10 mins CSO and CISO Threat and Vulnerability Management Data and Information Security news AWS environments compromised through exposed .env files Attackers collected Amazon Web Services keys and access tokens to various cloud services from environment variables insecurely stored in tens of thousands of web applications. By Lucian Constantin 22 Aug 2024 7 mins Data Breach AWS Lambda Data and Information Security how-to 3 key strategies for mitigating non-human identity risks For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. By Chris Hughes 22 Aug 2024 6 mins Data and Information Security Identity and Access Management Risk Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe