Email Alerts
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
-
How to get the most out of a SIM
A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... Tip
-
Richard Clarke: Don't ignore data risks, deploy encryption
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. Article
-
Reacting to a business partner's insider threat
In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. Ask the Expert
-
What is a logic bomb?
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. Ask the Expert
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Article
-
Database authentication, encryption getting priority in some businesses
While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. Article
Security Management Strategies for the CIO