Email Alerts
-
Creating an enterprise data protection framework
By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Video
-
Analyst DLP study finds maturity, ranks top DLP vendors
A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies. Article
-
PCI DSS compliance requirements: Ensuring data integrity
Want to make sure you have secure data for PCI DSS? One of the first steps is making sure the data you're trying to secure is the right data. Security management expert David Mortman explains how to ascertain and maintain data integrity. Tip
-
Trustwave acquires data loss prevention vendor Vericept
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors. Article
-
Data has become too distributed to secure, Forrester says
A Forrester Security Forum will address ways security pros can relax security policy and focus on mitigating the risks associated with employee use of Web-based tools and services. Article
-
Compliance in the cloud
Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security. Video
-
Database monitoring, encryption vital in tight economy, Forrester says
A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference. Article
-
Best practices for log data retention
Figuring out how long to retain log data and how much log data should be kept in the event of incident response can be tricky to navigate. In this information security management expert response, David Mortman gives best practices for log data retent... Ask the Expert
-
HIPAA changes force healthcare to improve data flow
Do you know where your data is? The latest HIPAA changes should motivate healthcare security teams to understand information flows. Column
-
Can read/write access policies be put on a SAN server?
A SAN usually contains an organization's most critical data, centralized in one convenient location. Platform security expert Michael Cobb explains how to be protect that information. Ask the Expert
Security Management Strategies for the CIO