Email Alerts
-
Can you combine RFID tag technology with GPS to track stolen goods?
When laptops or smartphones are stolen, retrieving them can mean the difference between a data breach a close call. Learn if it's possible to combine RFID tag technology with GPS devices for tracking stolen goods to their exact location, and if so ho... Ask the Expert
-
Microsoft to embed data classification, strengthen ties with DLP
Microsoft will embed data classification technology into its platform under a deal that ties Active Directory Rights Management Services with RSA's data loss prevention suite. Article
-
How to create a policy to avoid disgruntled employee data leaks
When crafting a data security policy, take into account that disgruntled employees may leak data. Learn how to prevent employee data leakage, and how to handle data loss if it occurs. Ask the Expert
-
FAQ: Corporate Web 2.0 Threats
In this expert video, you will learn about Web 2.0 software, the threats it poses, and whether the benefits outweigh the risks. Key areas covered include the threats posed by services like Facebook, MySpace, and LinkedIn, as well as wikis and blogs. ... Video
-
Fact or fiction: The security risks of cloud computing
Check out this expert podcast and learn about the benefits of cloud computing and SaaS and get tips for addressing the security challenges of these business options. Podcasts
-
IBM offers hardware-based encryption for x servers
IBM is calling its VAULT hardware-based encryption tool the first of its kind and says the price point should appeal to small and midmarket companies. Article
-
How to avoid DLP implementation pitfalls
Data leak prevention tools effectively reduce the chances that an enterprise's sensitive data will end up where it shouldn't, but several pitfalls can severely curtail a DLP tool's effectiveness. In this tip, Rich Mogull offers several best practices... Tip
-
Sophos to acquire mobile data protection company Utimaco
The independent mobile data protection market continues to shrink with Sophos' endpoint encryption acquisition. Article
-
Unified communications trigger data leakage dangers, survey finds
Companies are concerned about unintentional data leaks, according to a survey conducted by Osterman Research. Article
-
Easing e-discovery preparation by mapping enterprise data
With a well-planned data retention policy, an organization can often avoid tracking down old data when served with an e-discovery request. In this tip, Stephen Foskett highlights the linchpin of a data retention policy, the ESI map, including what it... Tip
Security Management Strategies for the CIO