Email Alerts
-
Disaster recovery report card: Measuring your company's disaster recovery profile
Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... Tip
-
Steal this Computer Book 4.0: Prevent Google hacking
Learn how to prevent Google hacking in this excerpt from Chapter 8: Stalking the Computer of "Steal this Computer Book 4.0," by Wallace Wang. Book Chapter
-
How to properly protect and retain data
Improperly securing, and storing, data can lead to a plethora of problems, including productivity degradation and non-compliance. Learn how to properly protect, and retain your corporate data in this security management Ask the Expert Q&A. Ask the Expert
-
Four tips for verifying that your backups work
The only thing worse than losing data is discovering that your backups don't work in the first place. These four tips will help you verify that your backups are indeed up to snuff. Tip
-
Easy hacks still tripping up corporate victims
Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC. Article
-
Man-in-the-middle attacks
This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. Book Chapter
-
Protect your business from a Google hack
Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl... Tip
-
Data leaks and losses abound
Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus. Article
-
How to stop data leakage
In this month's issue of Information Security magazine, learn about how security managers are looking for security in the cloud, and how to best protect your data. We review TriCipher's TACS v3.1.1, M-Tech Information Technology's ID-Synch v4.0 and m... E-Zine
-
Effective storage security policies
In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. Tip
Security Management Strategies for the CIO