Access your Pro+ Content below.
Step-by-step guide to avoiding basic database security risks
This issue of Information Security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Google says Chromium's process isolation and sandbox security features harden the OS from attack.
Use this checklist to ensure you're following the basics for securing database systems.
Enterprises need to make sure a SaaS provider has the proper security controls to protect sensitive data before a contract is signed
Forget structure-driven policy architecture; we'll show you how to build information security policy artifacts using a taxonomy approach that will help you build global policies in a snap.
Columns in this issue
The HITECH Act, part of the economic stimulus bill, is intended to foster electronic medical records systems adoption, but will also introduce security and privacy risks to patient medical and billing data.
Six months since President Obama announced he would appoint a cybersecurity coordinator, the position sits vacant. Do you care?