Avoid DLP failures by taking it slow, experts say

Data Loss Prevention

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to get the most out of a SIM

    A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... 

  • Richard Clarke: Don't ignore data risks, deploy encryption

    At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. 

  • Reacting to a business partner's insider threat

    In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. 

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. 

  • Are encryption products better than self-destructing data?

    Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." 

  • Springing leaks: Getting smart about data loss prevention

    Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. 

  • Database authentication, encryption getting priority in some businesses

    While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. 

  • Quiz: Preventing data leaks

    A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School. 

  • How to analyze internal security threats: Network security from the inside out

    Learn to effectively assess threats from internal clients, detect anomalies in outgoing traffic, architect networks to resist internal attacks, respond effectively when attacks occur and more. 

  • Nine tips to guarding your intellectual property

    How secure is your intellectual property? In this issue, learn strategies that can help you keep it safe, and secret. Also, read about the difference between trade secrets and patents, and the consequences of IP spillage.