![the-role-of-dlp-in-casbs](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-12%2FDLP%2520in%2520CASB.jpg&w=2048&q=75)
Protegiendo Datos en la Nube: El Rol Esencial de DLP en CASBs
![Aditya Sahu - Sr. Technical Marketing Engineer](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-09%2FDSC_6761%25201.jpg&w=3840&q=75)
Aditya Sahu
January 27, 2025
![7 Identity and Access Management Best Practices](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-12%2Fidentity-blog-post-header.jpg&w=2048&q=75)
7 Mejores Prácticas de Gestión de Identidad y Acceso para Aplicaciones en la Nube y Web
![brandon-keller.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fbrandon-keller_0.jpg&w=1920&q=75)
Brandon Keller
January 27, 2025
![hipaa-compliant-hero](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Fhipaa-compliant-hero.jpg&w=3840&q=75)
10 Técnicas para una Seguridad en la Nube Cumplida con HIPAA
![tim_herr.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Ftim_herr_0.jpg&w=828&q=75)
Tim Herr
January 27, 2025
![get-visibility-control-shadow-ai](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Fshadow-ai.jpg&w=2048&q=75)
Shadow AI: Qué es y cómo prevenirlo
![bryan-arnott-2.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fbryan-arnott-2_2.jpg&w=1200&q=75)
Bryan Arnott
January 3, 2025
![Top-notch data-breach-prevention](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Ftop-notch-data-breach.jpg&w=2048&q=75)
Construir una Estrategia de Prevención de Brechas de Datos de Alto Nivel
![rachel-russel](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Frachel-russel.jpg&w=828&q=75)
Rachel Russel
November 26, 2024
![saas-data-security-best-practices](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Fsaas-security-header.jpg&w=3840&q=75)
Detén las Brechas con 7 Mejores Prácticas de Seguridad de Datos para SaaS
![tim_herr.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Ftim_herr_0.jpg&w=828&q=75)
Tim Herr
November 26, 2024
![conquering-saas-security-risks](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-09%2F8-saas-security-risks.jpg&w=2048&q=75)
8 Riesgos de Seguridad en SaaS y Cómo Conquistarlos
![tim_herr.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Ftim_herr_0.jpg&w=828&q=75)
Tim Herr
October 21, 2024
![5 Keys to Full GenAI Security](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-09%2Ffull-genai.jpg&w=2048&q=75)
5 Claves para una Seguridad Completa en GenAI
![lionel_-_social_pic.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Flionel_-_social_pic_2.jpg&w=828&q=75)
Lionel Menchaca
October 21, 2024
![8 GenAI Best Practices for Users and Data](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-09%2Fgen-ai-users-data-header.jpg&w=3840&q=75)
8 Práticas Recomendadas de Seguridad de IA Generativa para Usuarios y Datos
![tim_herr.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Ftim_herr_0.jpg&w=828&q=75)
Tim Herr
September 19, 2024