Data security strategies and governance
- March 28, 2011
Organizations are failing to protect corporate trade secrets, despite cybercriminals finding a corporations' proprietary information growing in value.
- March 18, 2011
Experts say the risk of an attack that exploits stolen proprietary data on RSA's SecurID products is low, but it can't be completely dismissed until attack details are revealed.
- March 15, 2011
A Ponemon Institute survey of more than 500 auditors finds most prefer data encryption over tokenization to protect sensitive data.
- February 28, 2011
Early adopters of DLP deployments say slow, incremental rollouts help reduce the burden on IT staff and the potential for chaos among business units.
- June 10, 2010
Check Point said Liquid Machines' ERM capabilities could bolster its data loss prevention (DLP) offering.
- April 29, 2010
Sensitive data may be where you least expect it: including in the drawers of old office furniture you've given away. Kevin J. Mock explains how to create a data destruction policy that can prevent sensitive data from being thrown out with the trash.
- October 16, 2009
A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies.
- October 02, 2009
Voltage cites performance issues and the creation of a repository of cardholder data an attractive target for attackers. RSA calls Voltage's claims unfounded.
- September 10, 2009
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors.
- August 11, 2009
A Forrester Security Forum will address ways security pros can relax security policy and focus on mitigating the risks associated with employee use of Web-based tools and services.
- July 13, 2009
When it comes to cloud-based services, security vendors often put the cart before the horse, says columnist Eric Ogren.
- May 26, 2009
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective.
- April 29, 2009
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential.
- April 15, 2009
Large data breaches are the result of sophisticated, targeted external attacks that exploit basic errors, according to the latest data breach investigation report from Verizon.
- March 31, 2009
Lawmakers call the PCI standard lacking and seek significant improvements to the payment processing infrastructure to enhance security.