Do predefined DLP rules prevent compliance violations?

Data Loss Prevention

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to properly protect and retain data

    Improperly securing, and storing, data can lead to a plethora of problems, including productivity degradation and non-compliance. Learn how to properly protect, and retain your corporate data in this security management Ask the Expert Q&A. 

  • Four tips for verifying that your backups work

    The only thing worse than losing data is discovering that your backups don't work in the first place. These four tips will help you verify that your backups are indeed up to snuff. 

  • Easy hacks still tripping up corporate victims

    Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC. 

  • Man-in-the-middle attacks

    This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. 

  • Protect your business from a Google hack

    Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl... 

  • Data leaks and losses abound

    Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus. 

  • How to stop data leakage

    In this month's issue of Information Security magazine, learn about how security managers are looking for security in the cloud, and how to best protect your data. We review TriCipher's TACS v3.1.1, M-Tech Information Technology's ID-Synch v4.0 and m... 

  • Effective storage security policies

    In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. 

  • Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. 

  • June 2004: The best of SearchSecurity

    Peruse the top 10 news articles and tips published by SearchSecurity.com in June.