Email Alerts
-
Data loss prevention
While every CSO and security manager knows the importance of protecting sensitive data, there is still a big gap between that understanding and the actual implementation of tools to do the job. This lesson will provide a comprehensive overview of the... partOfGuideSeries
-
Preventing data leaks
Today's most devastating security breaches often originate from within. In some cases, insiders accidentally or inadvertently leak confidential or proprietary IP. In other cases, insiders commit corporate espionage on behalf of a competitor. The chal... partOfGuideSeries
-
Data Protection Security School
SearchSecurity.com's Data Protection Security School will help infosec professionals formulate a comprehensive strategy and pinpoint technologies that can help them secure sensitive information throughout the network -- including data in motion and d... guideSeries
-
Enterprise strategies for protecting data at rest
Many of today's data security breaches can be attributed to lost data. While security pros often focus on network soft spots, storage and e-discovery practices are often overlooked. This lesson will outline e-discovery services and how to ensure succ... guide
-
How to enforce a data destruction policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael ... Ask the Expert
-
How to create guidelines for using removable storage devices
Removable storage devices often sneak past the security radar; Expert Shon Harris explains how to incorporate portable storage into your organization's security policy. Ask the Expert
-
The pros and cons of data wiping
Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Platform Security Ask the Expert Q&A Ask the Expert
-
Disaster recovery report card: Measuring your company's disaster recovery profile
Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... Tip
-
Steal this Computer Book 4.0: Prevent Google hacking
Learn how to prevent Google hacking in this excerpt from Chapter 8: Stalking the Computer of "Steal this Computer Book 4.0," by Wallace Wang. Book Chapter
-
How to properly protect and retain data
Improperly securing, and storing, data can lead to a plethora of problems, including productivity degradation and non-compliance. Learn how to properly protect, and retain your corporate data in this security management Ask the Expert Q&A. Ask the Expert
Security Management Strategies for the CIO