Email Alerts
-
HIPAA changes force healthcare to improve data flow
Do you know where your data is? The latest HIPAA changes should motivate healthcare security teams to understand information flows. Column
-
Can read/write access policies be put on a SAN server?
A SAN usually contains an organization's most critical data, centralized in one convenient location. Platform security expert Michael Cobb explains how to be protect that information. Ask the Expert
-
Microsoft to embed data classification, strengthen ties with DLP
Microsoft will embed data classification technology into its platform under a deal that ties Active Directory Rights Management Services with RSA's data loss prevention suite. Article
-
Metaforic crosses swords with software pirates
Company joins a number of vendors in the application hardening market with a technology that embeds protections in a program at compile time. Article
-
RSA attendees see data classification, rights management projects stumble
SAN FRANCISCO -- Companies need to embark on data classification projects to gain more control over its movement and minimize data leakage, but it's difficult to find a company successfully carrying out a project. Rena Mears, Deloitte's global and U.... Interview
-
How to conduct a data classification assessment
Before businesses safeguard mission-critical data, they must know how to conduct data classification processes. Even though it is time-consuming and involves many steps, as Tom Bowers writes, data classification makes it easier to figure out where an... Tip
-
Discovering e-discovery services: How information security pros should prepare
Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... Tip
-
Archives and data protection: The important differences
While the two are both equally important, it's vital that you don't confuse archiving with data protection. Marc Staimer explains their differences. Tip
-
Week 44: Permissions, part 2 -- Who owns what when?
Attackers can gain access to your system through files, directories and devices with higher privileges than necessary that execute on behalf of a privileged task. Tip
-
Week 43: Permissions -- How world-writeable are you?
Files, directories and devices that can be modified by any user are known as "world–writable" and are dangerous security holes. Tip
Security Management Strategies for the CIO