logo

Regular Expressions for Beginners: How to Get Started Discovering Sensitive Data

Any data discovery and classification solution heavily relies on regular expressions (sometimes called RegExes, REs or RegEx patterns) to identify sensitive data. But what are RegExes and how can they be used to discover sensitive data? Let’s find out. Handpicked related content: Data Classification: What It Is, Why You Should Care and How to Perform … Continued

Microsoft File Classification Infrastructure (FCI) Explained

Understanding what data you have and where it is located is a critical step in complying with industry and government regulations, like the European Union’s GDPR directive. Microsoft introduced the File Classification Infrastructure (FCI) in Windows Server 2008 R2 to help organizations classify data stored on Windows file servers. Using FCI, system administrators can set … Continued

CISSP Practice Exam: Free Online Sample Questions

Get Ready for the CISSP Exam with a Free Online Quiz The CISSP is a globally recognized certification granted by the International Information System Security Certification Consortium, also known as (ISC)². This certification has become a prerequisite for many careers in information security. The CISSP covers eight broad domains, so it’s no surprise that preparing … Continued

The 12 Most Common Types of Cyber Security Attacks Today

There are many different types of attacks in cyber security — and network security teams must worry about all of them. While no organization can protect themselves against every type of threat, a company is expected to demonstrate due diligence in protecting against the most common forms of cyber-attacks. The bulk of cyber-attacks are no … Continued

[Infographics] Government’s Rapid Cloud Adoption Lacks Security

The Obama administration’s “Cloud First Initiative” in 2011 gave federal and local agencies the green light to explore cloud services. Both Amazon Web Services and Microsoft Azure immediately provided special offerings targeted at governmental needs, and agencies have been quickly embracing them. According to Fortune, AWS GovCloud has been growing by 221% year over year … Continued

RSA Conference 2018: Top 5 Pieces of Advice for CISOs

As expected, the 27th RSA Conference in April 2018 was one of the major IT security events of the year. 650 exhibitors and 45,000 security professionals came together in San Francisco’s Moscone Center to elaborate on the state of the art and the future of cyber security. Over 500 sessions encompassed a variety of issues, … Continued

Five Reasons to Ditch Manual Data Classification Methods

What is data classification and how hard is it? At first sight, data classification doesn’t look hard. There are four key steps in the process: Entering assets, such as email and electronic documents, in the asset register Classifying each asset according to its sensitivity Labeling the asset based on how it is classified Handling the … Continued