Email Alerts
-
Filling the data protection gap
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data prot... E-Zine
-
Real-world solutions for data loss prevention
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an ... E-Zine
-
Nine tips to guarding your intellectual property
How secure is your intellectual property? In this issue, learn strategies that can help you keep it safe, and secret. Also, read about the difference between trade secrets and patents, and the consequences of IP spillage. E-Zine
-
How to stop data leakage
In this month's issue of Information Security magazine, learn about how security managers are looking for security in the cloud, and how to best protect your data. We review TriCipher's TACS v3.1.1, M-Tech Information Technology's ID-Synch v4.0 and m... E-Zine
-
DLP deployments: Understanding your options
Kevin Beaver examines real-world DLP technologies and discusses some common pitfalls to avoid, ensuring your organization has a successful DLP deployment. security_school
-
Quiz: DLP deployments: Understanding your options
This five-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this DLP deployment Security School Lesson by Kevin Beaver. Quiz
-
Quiz: Database security issues
This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson. Quiz
-
Database security issues
The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monitor database access to detect potential security incid... partOfGuideSeries
-
Choosing security products: DLP technology
Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. guide
-
Readers' Choice Awards 2012
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories. guideSeries
-
Security visibility: Honestly assessing security posture
In this security school, you’ll learn how to gain the clearest visibility into the state of your company’s information security efforts. You’ll learn strategically how to make the most of your SIM, log management, network monitoring, GRC and penetrat... partOfGuideSeries
-
Quiz: Data breach prevention strategies
Test your knowledge of data breach prevention strategies in this five-question quiz. Quiz
-
Data breach prevention strategies
This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organizatio... partOfGuideSeries
-
Quiz: Network content monitoring must-haves
See if you know the essentials of network content monitoring in this SearchSecurity.com Security School quiz. Quiz
- See more Essential Knowledge on Data Loss Prevention
-
Case study: CDI launches aviation company DLP program on short runway
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client. News | 24 May 2013
-
Experts at the CSA 2013 Summit say mobile security depends on cloud security
Panelists at the Cloud Security Alliance Summit say mobile security and cloud security are linked, and that preventing data loss demands securing the app layer. News | 25 Feb 2013
-
Social engineering, employee gaffes require full attention, says expert
Technologies like data loss prevention boost protection, but a determined adversary will get past the sensors, explains security expert Hugh Thompson. News | 12 Dec 2012
-
Lessons learned from real-world DLP technology deployments
Successful data loss prevention deployments require data governance maturity, a great deal of tuning and acknowledgement that it's not a panacea. News | 12 Dec 2012
-
Organizations have poor digital document security, survey reveals
At study by the Ponemon Institute shows 63% of organizations do not fully secure confidential documents. News | 03 Aug 2012
-
Recent data breaches redefine failure, demand new approaches
Column: What do recent data breaches at RSA, WordPress and Sony have in common? Companies must not only find weaknesses, but also actively hunt down intruders. Column | 28 Apr 2011
-
Data loss prevention best practices start with slow, incremental rollouts
Early adopters of DLP deployments say slow, incremental rollouts help reduce the burden on IT staff and the potential for chaos among business units. Article | 28 Feb 2011
-
Identity Finder releases new data loss prevention products
Identity Finder has added to its line of data loss prevention products with Identify Finder 5.0 for Windows and Mac operating systems, plus a new Identity Finder DLP console. Article | 15 Feb 2011
-
Symantec encryption strategy expands PGP, nixes GuardianEdge brand
Following its recent encryption acquisitions, Symantec will phase out the GuardianEdge name and integrate PGP Whole Disk Encryption with support for Symantec Data Loss Prevention. Article | 05 Oct 2010
-
Lessons learned: Societe Generale and alleged theft of trade secrets
The recent arrest of a former trader suspected of stealing computer code underscores the need for strong access controls and monitoring. Article | 04 May 2010
- See more News on Data Loss Prevention
-
Prevent data loss, theft with secure data outputs
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications. Opinion
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Tip
-
DLP management tools and reporting: Key considerations
When it comes to DLP management tools, installation and maintenance of a single centralized management console to house all rules and alerts are key. Tip
-
With DLP, encryption and integration strengthen security policies
Encryption and DLP integration can be used to enhance and strengthen security policies for sensitive data, and for blocking and enforcement actions. Tip
-
Using DLP tools for data leakage alerting and preventive actions
When evaluating DLP tools, it's important to determine data leakage alerting and preventive action needs for potential violations and blocking. Tip
-
DLP monitoring: Defining policies to monitor data
DLP monitoring policies help define what data to evaluate, how data monitoring processes should occur, and what enforcement and alerting actions to take. Tip
-
Effective DLP products need data discovery and data fingerprinting
Effective DLP products must be able to handle data discovery to identify and monitor sensitive data. Learn why these features matter. Tip
-
Assumption of breach: How a new mindset can help protect critical data
By adopting the assumption-of-breach security model, CISOs and security pros can better protect critical data. Expert Ernie Hayden explains. Tip
-
Improving enterprise email security: Systems and tips
Enterprise email security has become more vital than ever due to increased attacks and threats. This tip details systems that can improve protection. Tip
-
BYOD security: How to remotely wipe iPhone and Android devices
Remote data wipe is key to any BYOD security policy, but each OS handles it differently. Lisa Phifer covers how to use it with other controls to protect data. Tip
-
Use data loss prevention software to secure endpoints from malicious insiders
Mobile devices make it easier than ever for malicious insiders to take sensitive data from the enterprise. Data loss prevention software can help with endpoint security management. Tip
- See more Tips on Data Loss Prevention
-
How does steganography work and does it threaten enterprise data?
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Answer
-
The pros and cons of SSL decryption for enterprise network monitoring
Expert Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring method. Answer
-
How to protect sensitive data when executives travel abroad
Concerned about data theft when enterprise executives travel? Security expert Nick Lewis details how to protect sensitive data when execs go abroad. Answer
-
Avoiding a breach by a third-party data recovery services provider
Expert Nick Lewis discusses the security requirements enterprises should establish when selecting a third-party data recovery services provider. Answer
-
Detecting covert channels to prevent enterprise data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis. Answer
-
Is laptop remote wipe needed for effective laptop data protection?
Expert Michael Cobb explains how laptop remote wipe technology can ease data loss fears, but shouldn’t be solely relied upon. Answer
-
Negotiating an IT security budget for a data loss prevention tool
If your enterprise is considering a DLP purchase, read this expert response for advice on getting the information security budget to buy the best product possible. Ask the Expert
-
Will technologies like Vanish help create archived, unreadable data?
Self-destructing data is a nice thought, says Michael Cobb, but we're some ways off from achieving reliable document control of this kind. Ask the Expert
-
How to secure USB ports on Windows machines
A readers asks expert Michael Cobb about which product can best secure USB ports. Ask the Expert
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation. Ask the Expert
- See more Expert Advice on Data Loss Prevention
-
Practical advice for managing DLP technology effectively
In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program. Podcast
-
Data loss prevention tools: Understanding your options
Video: Kevin Beaver uses real-life experiences with data loss prevention tools to help you with your technology choices, rollout and management. Video
-
International data protection: 'Evil maid' attacks, HDD cloning risks
Video: Cryptoseal CEO Ryan Lackey details the threats associated with international data protection, from cloned hard drives to evil maid attacks. Video
-
DLP use cases: When to use network storage and endpoint DLP
In this video, our expert will explain how different types of DLP work, such as network and endpoint DLP, and how it secures data at rest. Video
-
Holistic security for database-centric applications
In this exclusive video presentation, Nemertes Research Senior Vice President and Founding Partner Andreas Antonopoulos provides an executive overview of the security issues of securing database-centric applications and the key tactics essential to s... Video
-
How EDRM can bolster enterprise content management security
Learn about implementing enterprise EDRM and how this technology combo supports enterprise content management security. Video
-
Enterprise network content monitoring best practices
This presentation offers a strategic look at enterprise content monitoring and provides guidance on how key technologies can underpin necessary control sets for your organization. Video
-
Expert Podcast: Five Ways to Combat Social Engineering Attacks Against Your Organization
Nearly every attack against an organization has its roots in social engineering. Attackers do significant reconnaisance against targets and mine data in order to craft campaigns to steal identity data and access. In this podcast, you’ll learn five wa... Podcast
-
Expert Webcast: Realign Your Data Protection Efforts
Attackers go to great lengths to infiltrate organizations and go well beyond technically savvy hacks to worm through networks and systems to steal identity information and ultimately intellectual property. This webcast will break down a modern attack... Mediacast
-
CISO details DLP deployment issues at RSA Conference 2011
In an interview at RSA Conference 2011, Larry Whiteside Jr., CISO of the Visiting Nurse Service of New York, outlines some of the successes and the pitfalls of deploying data leakage protection software for the first time. Video
- See more Multimedia on Data Loss Prevention
-
How does steganography work and does it threaten enterprise data?
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Answer
-
DLP deployments: Understanding your options
Kevin Beaver examines real-world DLP technologies and discusses some common pitfalls to avoid, ensuring your organization has a successful DLP deployment. security_school
-
Quiz: DLP deployments: Understanding your options
This five-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this DLP deployment Security School Lesson by Kevin Beaver. Quiz
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Tip
-
Practical advice for managing DLP technology effectively
In this podcast, Kevin Beaver provides advice for managing DLP technology in your environment to ensure a successful data loss prevention program. Podcast
-
Data loss prevention tools: Understanding your options
Video: Kevin Beaver uses real-life experiences with data loss prevention tools to help you with your technology choices, rollout and management. Video
-
Quiz: Database security issues
This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson. Quiz
-
Database security issues
The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monitor database access to detect potential security incid... partOfGuideSeries
-
Case study: CDI launches aviation company DLP program on short runway
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client. News
-
DLP management tools and reporting: Key considerations
When it comes to DLP management tools, installation and maintenance of a single centralized management console to house all rules and alerts are key. Tip
- See more All on Data Loss Prevention
About Data Loss Prevention
In this intrusion detection and prevention guide learn how to build a security system to detect and prevent malicious hacker activity with data loss prevention (DLP) software and products.
Security Management Strategies for the CIO