Email Alerts
-
Security visibility: Honestly assessing security posture
In this security school, you’ll learn how to gain the clearest visibility into the state of your company’s information security efforts. You’ll learn strategically how to make the most of your SIM, log management, network monitoring, GRC and penetrat... partOfGuideSeries
-
Quiz: Data breach prevention strategies
Test your knowledge of data breach prevention strategies in this five-question quiz. Quiz
-
Data breach prevention strategies
This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organizatio... partOfGuideSeries
-
Adopt Zero Trust to help secure the extended enterprise
Forrester Analyst John Kindervag explains Zero Trust Model and how it can be applied to protect data in today’s extended enterprise. Tip
-
Quiz: Network content monitoring must-haves
See if you know the essentials of network content monitoring in this SearchSecurity.com Security School quiz. Quiz
-
Network Content Monitoring
Technologies that monitor how data moves in and out of organizations are rapidly intersecting. Data loss prevention, digital rights management and database activity monitoring, just to mention a few, all have overlapping functions and purposes not on... guide
-
EDRM-DLP combination could soon bolster document security management
The integration of enterprise digital rights management solutions and data loss prevention tools could bring a level of automation to document security management. Tip
-
How EDRM can bolster enterprise content management security
Learn about implementing enterprise EDRM and how this technology combo supports enterprise content management security. Video
-
Enterprise network content monitoring best practices
This presentation offers a strategic look at enterprise content monitoring and provides guidance on how key technologies can underpin necessary control sets for your organization. Video
-
Detecting covert channels to prevent enterprise data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis. Answer
Security Management Strategies for the CIO