Email Alerts
-
Realigning your data protection priorities
In this Security School lesson, expert David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting y... guide
-
How to know if you need file activity monitoring to track file access
Is file activity monitoring, a new product meant to integrate with DLP to provide more granular file access tracking, right for your enterprise? Tip
-
Is laptop remote wipe needed for effective laptop data protection?
Expert Michael Cobb explains how laptop remote wipe technology can ease data loss fears, but shouldn’t be solely relied upon. Answer
-
Recent data breaches redefine failure, demand new approaches
Column: What do recent data breaches at RSA, WordPress and Sony have in common? Companies must not only find weaknesses, but also actively hunt down intruders. Column
-
Data loss prevention best practices start with slow, incremental rollouts
Early adopters of DLP deployments say slow, incremental rollouts help reduce the burden on IT staff and the potential for chaos among business units. Article
-
CISO details DLP deployment issues at RSA Conference 2011
In an interview at RSA Conference 2011, Larry Whiteside Jr., CISO of the Visiting Nurse Service of New York, outlines some of the successes and the pitfalls of deploying data leakage protection software for the first time. Video
-
Identity Finder releases new data loss prevention products
Identity Finder has added to its line of data loss prevention products with Identify Finder 5.0 for Windows and Mac operating systems, plus a new Identity Finder DLP console. Article
-
Data sanitization policy: How to ensure thorough data scrubbing
Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip. Tip
-
Realign your data protection strategy efforts
In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. Video
-
Resist credit card data compromise threats due to memory-scraping malware
PCI DSS does a good job of making sure credit card data in persistent storage is secure, however, such data in non-persistent storage -- such as files stored temporarily in memory -- can still be vulnerable to compromise, particularly via memory-scra... Tip
Security Management Strategies for the CIO