Email Alerts
-
Microsoft to embed data classification, strengthen ties with DLP
Microsoft will embed data classification technology into its platform under a deal that ties Active Directory Rights Management Services with RSA's data loss prevention suite. Article
-
Metaforic crosses swords with software pirates
Company joins a number of vendors in the application hardening market with a technology that embeds protections in a program at compile time. Article
-
RSA attendees see data classification, rights management projects stumble
SAN FRANCISCO -- Companies need to embark on data classification projects to gain more control over its movement and minimize data leakage, but it's difficult to find a company successfully carrying out a project. Rena Mears, Deloitte's global and U.... Interview
-
Discovering e-discovery services: How information security pros should prepare
Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... Tip
-
How to conduct a data classification assessment
Before businesses safeguard mission-critical data, they must know how to conduct data classification processes. Even though it is time-consuming and involves many steps, as Tom Bowers writes, data classification makes it easier to figure out where an... Tip
-
Archives and data protection: The important differences
While the two are both equally important, it's vital that you don't confuse archiving with data protection. Marc Staimer explains their differences. Tip
-
Week 44: Permissions, part 2 -- Who owns what when?
Attackers can gain access to your system through files, directories and devices with higher privileges than necessary that execute on behalf of a privileged task. Tip
-
Week 43: Permissions -- How world-writeable are you?
Files, directories and devices that can be modified by any user are known as "world–writable" and are dangerous security holes. Tip
-
Best practices for writing an information classification policy
When developing your organization's information classification policy, there are three best practices that you should keep in mind. Tip
-
RSA: Enterprise security suffering from information overload
SAN FRANCISCO -- The growth rate of system and software vulnerabilities has tripled in the last 24 months to 60 per month, and new viruses are popping up at a rate of 10 to 15 a month. In the meantime, enterprises are being bombarded with constant al... Interview
Security Management Strategies for the CIO