3 strategies for building an information protection program

Credit to Author: Todd VanderArk| Date: Tue, 25 Jun 2019 16:20:29 +0000

Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices.

The post 3 strategies for building an information protection program appeared first on Microsoft Security.

Read more

Decentralized identity and the path to digital privacy

Credit to Author: Todd VanderArk| Date: Wed, 15 May 2019 13:00:30 +0000

Security is the central challenge of the digital age. Our digital lives have moved into the cloud. People now use multiple devices to connect to multiple applications through many different networks. Just about everything is connected to the internet, where threats remain constant and evolving. In this distributed, heterogeneous environment, however, there’s still only one “you.” That’s why decentralized identity is the best path to security.

The post Decentralized identity and the path to digital privacy appeared first on Microsoft Security.

Read more

Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 19:00:42 +0000

Microsoft and Forcepoint are working closely to develop an integrated solution that makes it easy to discover, classify, label, and protect critical business data.

The post Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data appeared first on Microsoft Security.

Read more