Access "Align your data protection efforts with GRC"
This article is part of the July/August 2009 issue of Why privileged account management is critical to today's data security
In today's security-conscious organization, there is a split between two competing security camps: the policy-driven governance, risk and compliance (GRC) group and the technology-driven data protection group. In the "ring of protection," the GRC camp and data protection camp are locked in a veritable "Smackdown," wrestling for the same buckets of resources and funding for their projects.. Ultimately, however, both sides need each other to succeed. Data protection tools such as DLP examine, block and report on unauthorized transmission of data which protects an organization against loss of sensitive and confidential information. In many organizations, they're being deployed as a stopgap measure while security managers develop and/or refine their long term protection strategies. But how do you configure a DLP service without proper security standards already in place? Vendors may offer "best practice" sets of configuration data, but be cautious: While they can be used as examples of the information needed to configure a DLP service, they generally don't ... Access >>>
Premium Content for Free.
ISP shutdown latest cat-and-mouse game with hackers
While the 3FN.Net shutdown had limited impact on cybercriminals, it signaled that the private sector and the government are serious about illegal activity.
DNSSEC deployments gain momentum since Kaminsky DNS bug
DNSSEC brings PKI to the Domain Name System and prevents dangerous cache poisoning attacks. Implementation difficulties and political battles, however, keep it from going mainstream.
- ISP shutdown latest cat-and-mouse game with hackers
Privileged account management critical to data security
Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts.
Unified threat management products gaining midmarket, enterprise foothold
Unified threat management (UTM) appliances offer consolidated security services in a single, manageable firewall/VPN appliance. But purchase and use only the security options you need. Otherwise you will pay too much for the appliance and for tools that won't make your business more secure
- Privileged account management critical to data security
Editor's Desk: Google security needs HTTPS by default
Security's leading thinkers ask Google to turn on HTTPS by default for Gmail, Docs and Calendar.
Align your data protection efforts with GRC
Data protection and compliance teams battle for resources but need each other to succeed.
- Editor's Desk: Google security needs HTTPS by default
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...