Email Alerts
-
The rapid evolution of MDM solutions
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... E-Zine
-
Big data analytics: New patterns emerge for security
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools. Feature
-
Managing big data privacy concerns: Tactics for proactive enterprises
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help enterprises get smarter while keeping consumers happy. Feature
-
Quiz: Security log analysis for actionable security information
Test your knowledge of security log analysis in this five-question quiz. Quiz
-
Book chapter: Browser security principles, same-origin policy exceptions
This is an excerpt from the book Web Application Security: A Beginner’s Guide that describes the intricacies of using script code within the framework of a same-origin policy. Feature
-
RSA 2013: More from Coviello on big data analytics in the security industry
RSA's Art Coviello explains why the shortcomings of current mainstream security products are part of what's driving enterprise interest in big data. News | 28 Feb 2013
-
Big data 2.0: CISOs push need to identify attack campaigns
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts. News | 27 Feb 2013
-
Verizon DBIR: Identify insider threat warning signs, safeguard IP
Trusted insiders often play a role in IP theft, according to a new report. Spot the warning signs and apply the right data protection, say experts. News | 24 Oct 2012
-
Gartner: Big data security will be a struggle, but necessary
The research firm says big data security analysis will be critical to fighting off advanced attacks, but few easy technology options exist today. News | 12 Jun 2012
-
RSA Conference 2012 keynote prescribes intelligence-driven security
RSA’s Arthur Coviello urged security pros to break down silos and intelligence-driven security programs, or face a tough year. News | 28 Feb 2012
-
Symantec acquires LiveOffice for online data archiving
Symantec said the $115 million-dollar deal boosts its e-discovery business and offer security and antispam capabilities for on-premise and hosted email. News | 16 Jan 2012
-
Data reduction software accelerates computer forensic investigations
Data reduction software is an essential part of any computer forensics process. Expert Richard W. Walker looks at data reduction software tools and processes and the role they play. News | 05 Jul 2011
-
Former @stake researcher Aitel insists on data classification
Know your data before turning to the cloud, says Dave Aitel, CTO of Immunity Inc. Aitel criticized traditional security technologies at FIRST Conference 2010. Article | 16 Jun 2010
-
Analyst DLP study finds maturity, ranks top DLP vendors
A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies. Article | 16 Oct 2009
-
Trustwave acquires data loss prevention vendor Vericept
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors. Article | 10 Sep 2009
- See more News on Data Analysis and Classification
-
Converting to cloud: Ranum Q&A with Lee Heath
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process. Column
-
Is big data education a big failure?
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer? Column
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility. Tip
-
Security big data: Preparing for a big data collection implementation
Learn how security big data initiatives support enterprise information security and how to prepare for a big data collection implementation. Tip
-
Intro: How big data benefits enterprise information security posture
Andrew Hutchison explains how big data benefits enterprise information security posture by merging the security and operational data landscape. Tip
-
Information security intelligence demands network traffic visibility
Use the network and host data at your disposal to create business-focused information security intelligence policies and strategies. Tip
-
Security event log management, analysis needs effective ways to search log files
Search is a key discipline for security log management. John Burke explains how to better search log files to improve security event log management. Tip
-
Metadata security and preventing leakage of sensitive information
Without accounting for metadata security, sensitive document data can easily be extracted. Mike Chapple explores technologies to support metadata security. Tip
-
NSA best practices for data security
Find out about Homeland Security and NSA best practices for automating data gathering, easing compliance and improving security. Tip
-
PCI DSS compliance requirements: Ensuring data integrity
Want to make sure you have secure data for PCI DSS? One of the first steps is making sure the data you're trying to secure is the right data. Security management expert David Mortman explains how to ascertain and maintain data integrity. Tip
-
How to conduct a data classification assessment
Before businesses safeguard mission-critical data, they must know how to conduct data classification processes. Even though it is time-consuming and involves many steps, as Tom Bowers writes, data classification makes it easier to figure out where an... Tip
-
Discovering e-discovery services: How information security pros should prepare
Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... Tip
- See more Tips on Data Analysis and Classification
-
Data-classification levels for compliance: Why simple is best
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories. Answer
-
What is 'big data'? Understanding big data security issues
In this Ask the Expert video, Ernie Hayden answers the question of what 'big data' is and outlines big data security issues in this video. Answer
-
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Answer
-
Does reducing data storage improve PCI credit card compliance?
Mike Chapple discusses whether reducing customer credit card data storage is better, worse or ineffective for improving PCI credit card compliance. Answer
-
SOX data retention policies: What to do with old software archives
What do you do when sensitive data is stored on old versions of software? In this expert response, Ernie Hayden discusses how to make sure you retain data correctly for Sarbanes Oxley compliance purposes. Ask the Expert
-
Best practices for log data retention
Figuring out how long to retain log data and how much log data should be kept in the event of incident response can be tricky to navigate. In this information security management expert response, David Mortman gives best practices for log data retent... Ask the Expert
-
Can read/write access policies be put on a SAN server?
A SAN usually contains an organization's most critical data, centralized in one convenient location. Platform security expert Michael Cobb explains how to be protect that information. Ask the Expert
-
Data integrity authentication scheme
Ask the Expert
-
Practical advice for managing DLP technology effectively
In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program. Podcast
-
Data loss prevention tools: Understanding your options
Video: Kevin Beaver uses real-life experiences with data loss prevention tools to help you with your technology choices, rollout and management. Video
-
Bruce Schneier explains why there is no privacy on the Internet
Video: Bruce Schneier provides three examples to prove there is no privacy on the Internet. Is government regulation needed? Video
-
Log management and analysis: How, when and why
In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture. Video
-
Realign your data protection strategy efforts
In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. Video
-
Creating an enterprise data protection framework
By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Video
-
Compliance in the cloud
Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security. Video
-
Data-classification levels for compliance: Why simple is best
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories. Answer
-
Converting to cloud: Ranum Q&A with Lee Heath
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process. Column
-
Is big data education a big failure?
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer? Column
-
Practical advice for managing DLP technology effectively
In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program. Podcast
-
Data loss prevention tools: Understanding your options
Video: Kevin Beaver uses real-life experiences with data loss prevention tools to help you with your technology choices, rollout and management. Video
-
Big data analytics: New patterns emerge for security
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools. Feature
-
The rapid evolution of MDM solutions
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... E-Zine
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility. Tip
-
Bruce Schneier explains why there is no privacy on the Internet
Video: Bruce Schneier provides three examples to prove there is no privacy on the Internet. Is government regulation needed? Video
-
RSA 2013: More from Coviello on big data analytics in the security industry
RSA's Art Coviello explains why the shortcomings of current mainstream security products are part of what's driving enterprise interest in big data. News
- See more All on Data Analysis and Classification
About Data Analysis and Classification
In this learning guide, get advice on data classification and learn how classifying and storing sensitive information according to a risk and threat level can help keep data secure. Experts offer advice on data classification methods, models and tools, as well as digital rights management (DRM) and protection on intellectual property.
Security Management Strategies for the CIO