Email Alerts
-
Symantec fills gap with whole disk storage encryption
Symantec added whole disk and removable storage encryption to its portfolio through a partnership with GuardianEdge, working to strengthen its competitive position. Article
-
Data loss prevention (DLP) tools: The new way to prevent identity theft?
Despite advances in perimeter technologies, data theft has become common in today's enterprises. To protect their confidential information, some security professionals are turning to an emerging technology category: data loss prevention. But don't th... Tip
-
How to lock down USB devices
USB devices, thumb drives, flash drives -- whatever you call them, portable media present a significant challenge for enterprises, as they enable easier data transport for mobile workers, but are often the cause for catastrophic data leaks. In this t... Tip
-
Data loss prevention from the inside out
Corporate information loss can often be credited to a company's internal organization, or lack thereof. In other words, in order to prevent data leakage, corporations must not only eliminate external threats, but also internal processes that could en... Tip
-
Fact or fiction: Building and enforcing DLP policies
Deploying a data loss prevention (DLP) solution is just the first step in the process of controlling the sensitive data flowing through your company's network. But DLP solutions need robust policies and procedures to increase their effectiveness. Thi... Podcast
-
With data breach costs soaring, companies should review data sharing policies
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey. Article
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
Enterprise data management: Analyzing business processes and infrastructure for data protection
Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection Security School, guest instructor Russell L. Jones exp... Tip
-
Trend Micro acquires Provilla for data protection
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday. Article
-
Seagate pushes hard drive encryption to the data center
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready? Article
Security Management Strategies for the CIO