Email Alerts
-
How to get the most out of a SIM
A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... Tip
-
Richard Clarke: Don't ignore data risks, deploy encryption
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. Article
-
Reacting to a business partner's insider threat
In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. Ask the Expert
-
What is a logic bomb?
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. Ask the Expert
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Article
-
Database authentication, encryption getting priority in some businesses
While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. Article
-
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School. Quiz
-
How to analyze internal security threats: Network security from the inside out
Learn to effectively assess threats from internal clients, detect anomalies in outgoing traffic, architect networks to resist internal attacks, respond effectively when attacks occur and more. Video
-
Nine tips to guarding your intellectual property
How secure is your intellectual property? In this issue, learn strategies that can help you keep it safe, and secret. Also, read about the difference between trade secrets and patents, and the consequences of IP spillage. E-Zine
Security Management Strategies for the CIO