Email Alerts
-
Data loss prevention from the inside out
Corporate information loss can often be credited to a company's internal organization, or lack thereof. In other words, in order to prevent data leakage, corporations must not only eliminate external threats, but also internal processes that could en... Tip
-
Fact or fiction: Building and enforcing DLP policies
Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. Thi... Podcast
-
With data breach costs soaring, companies should review data sharing policies
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey. Article
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
Enterprise data management: Analyzing business processes and infrastructure for data protection
Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection Security School, guest instructor Russell L. Jones exp... Tip
-
Trend Micro acquires Provilla for data protection
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday. Article
-
Seagate pushes hard drive encryption to the data center
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready? Article
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
Security Management Strategies for the CIO