
New infosec products of the week: September 28, 2018
Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities Chronicle, the cybersecurity subsidiary of Google’s parent company Alphabet, has …
Code42 Forensic File Search delivers visibility to file movement across cloud services
Code42 has extended the investigation capabilities of its Code42 Forensic File Search product beyond endpoints to include cloud services, offering security teams visibility to …
Code42’s data security platform reduces user downtime and costs for Windows 10 migrations
Code42 announced enhancements for Windows 10 Device Migration. Designed to help organizations reduce risks and costs related to data loss, user downtime and lost productivity, …

72% of CEOs admit they’ve taken intellectual property from a former employer
In a clear demonstration that top executives defy data security best practices and company policy, 72 percent of CEOs admit they’ve taken valuable intellectual property (IP) …
Code42 Forensic File Search offers visibility to endpoint data
Code42 announced its Code42 Forensic File Search solution helps organizations simplify compliance with the Global Data Protection Regulation (GDPR), which went into effect May …

Is GDPR-regulated data lurking in unexpected pockets of your organization?
A recent study showed that over 60 percent of corporate data is stored on employee endpoints. And yet, as companies work to ensure compliance with the new General Data …

New infosec products of the week: January 12, 2018
Code42 enhances data security and recovery solution Code42 announced enhancements to its data security solution. The Security Center helps detect and mitigate insider threat …

Is trading resilience for business growth a smart strategy?
Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

Enterprises increasingly leveraging endpoint data for security investigations
Code42 confirmed how critical it is for organizations to access and leverage endpoint data for additional uses above and beyond backup and recovery. Among 155 IT professionals …

New infosec products of the week: May 5, 2017
Inside threat detection and alerting from Code42 Code42 introducted Inside Threat Detection to its enterprise data protection and security platform. By generating proactive …

Insider threat vs. inside threat: Redefining the term
The traditional meaning of “insider threat” is: a current employee or contractor who, intentionally or accidentally, misuses his or her authorized access to a secure network …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility