Data loss protection: around the Hash Table.
Four members of the CyberWire’s hash table of experts:
- Tom Quinn - CISO - T. Rowe Price Associates
- Nikk Gilbert - CISO - Cherokee Nation Businesses
- Dawn Cappelli - VP of Global Security and CISO for Rockwell Automation
- Gary McAlum - CSO- USAA
discuss the things they worry about when it comes to data loss protection.
“Cyber Deception,” Dave Climek, Anthony Macera, and Walt Tirenin, Journal of Cyber Security and Information Systems, Volume: 4 Number: 1 - Focus on Air Force Research Laboratory’s Information Directorate, 8 March 2016.
“Cyber Deception Systems - Market Segment Report,” by Wellington Research, 2019.
“Data loss prevention,” Box.
"Data Loss Prevention (DLP)," by Imperva.
“Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171,” by Ron Ross, Victoria Pillitteri, Gary Guissanie, Ryan Wagner, Richard Graubart, Deb Bodeau, National Institute of Standards and Technology (NIST), July 2020.
“Materiality in a nutshell,” by Datamaran, last visited 30 April 2020.
“Overview of data loss prevention,” by Microsoft, 12 July 2019.
“Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: NIST Special Publication 800-171, Revision 2,” by Ron Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie, National Institute of Standards and Technology (NIST), February 2020.
“The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019: The 13 Providers That Matter Most And How They Stack Up,” by Heidi Shey, Forrester, 10 June 2019.
“What is a Honeypot?” by Caleb Townsend, Cybersecurity Magazine.