Whitepapers

Access free white papers, analyst research and industry reports covering a wide range of data security topics including sensitive data discovery, data classification and data loss prevention.

The Fifth Annual Study on Medical Identity Theft is an industry-sponsored research project by the Medical Identity Fraud Alliance.

GET THE WHITEPAPER

The Fifth Annual Study on Medical Identity Theft is an industry-sponsored research project by the Medical Identity Fraud Alliance. Medical identity theft is costly and complex to resolve. Because the crime can cause serious harm to its victims, it is critical for healthcare providers, health plans and technology/service providers to do more to help victims resolve the consequences of the theft and prevent future fraud. Download this paper to learn about the potential damage to providers and vendors of health care services when their sensitive data is stolen and customers pay the consequences.

2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013...

GET THE WHITEPAPER

2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In the case of Target breach, 40 million credit and debit cards were stolen and 70 million records stolen that included the name, address, email address and phone number of Target shoppers. Sony suffered a major online attack that resulted in employees' personal data and corporate correspondence being leaked. The financial consequences and reputation damage of both breaches have been widely reported.

Once relegated to the back pages of local newspapers, today's data breaches are primetime news. Negative media coverage is often...

GET THE WHITEPAPER

Once relegated to the back pages of local newspapers, today's data breaches are primetime news. Negative media coverage is often accompanied by scrutiny from public officials and foreboding consumer notifications, all of which emphasize the increased risk of identity fraud after a breach. Once thought to be a theoretical consequence, new evidence clearly shows consumers become less apt to open their wallets and patronize a company after a data breach. In addition to potential lost business and goodwill, a breached company may find itself saddled with the cost of litigation and subsidizing identity protection services for affected consumers.

All data breaches are bad news, but some are much more costly than others. To find out why, SANS Analyst Program surveyed C-level executives and...

GET THE WHITEPAPER

All data breaches are bad news, but some are much more costly than others. To find out why, SANS Analyst Program surveyed C-level executives and security officers in finance, health, government, education and retail. Their report presents the important results of their survey and offers practical advice on dealing with data breaches. Download this paper and get the facts and strategies that can help you understand post-breach impacts and how to mitigate them.

You know you have sensitive data such as PCI, PHI, PII or intellectual property, and you know you should classify it so you can both use it and protect it...

GET THE WHITEPAPER

You know you have sensitive data such as PCI, PHI, PII or intellectual property, and you know you should classify it so you can both use it and protect it. This paper, based on a webinar presented by Spirion (formerly Identity Finder) and Forrester Research, offers practical advice for completing this critical job. Get this whitepaper now and learn how to start your process for classifying and effectively protecting your sensitive data.

Not all sensitive data is regulated. Sure, companies know they need to protect PII, PCI and PHI—because data privacy laws requirement them to.

GET THE WHITEPAPER

Not all sensitive data is regulated. Sure, companies know they need to protect PII, PCI and PHI—because data privacy laws requirement them to. But many neglect to protect company-unique sensitive data--and suffer the consequences. Download this whitepaper and find out how you can benefit from a comprehensive, cost effective approach to protecting all your sensitive data.

Don't let an incident become a breach.

sensitive data protection software – try it free

Find the sensitive data hiding on your systems.

request a Sensitive Data Manager software demo

View an expert-guided tour of our platform.

call for data protection software

Learn about costs and capabilities by calling USA 646-863-8301.