Email Alerts
-
Interest in data leakage protection, event log management rises
Compliance projects are fueling interest in log management software. Data leakage protection (DLP) technology is also being considered, according to a new survey of security pros. Article
-
Will technologies like Vanish help create archived, unreadable data?
Self-destructing data is a nice thought, says Michael Cobb, but we're some ways off from achieving reliable document control of this kind. Ask the Expert
-
Five endpoint DLP deployment data security tips
Deploying data loss prevention technology on endpoints requires a careful roll-out. Expert Rich Mogull offers five tips, including the need to start slowly with a set of power users and how to manage endpoint discovery. Tip
-
Filling the data protection gap
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data prot... E-Zine
-
Considerations for buying and implementing DLP solutions
Financial institutions are looking to data loss prevention solutions to prevent costly data security breaches. In this tip, Dave Shackleford explains key issues to weigh before buying and installing a DLP product. Tip
-
Fact or fiction: Inside extrusion detection and prevention technology
According to our latest survey of more than 608 enterprise security pros, 80% of enterprises say protecting data is more important in 2007 than last year, and 72% admit they need a better strategy. SearchSecurity.com is responding to this growing ne... Podcast
-
Health Net breach failure of security policy, technology
Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them. Column
-
Health Net healthcare data breach affects1.5 million
A lost hard drive contained seven years of patient data including Social Security numbers and medical records of more than a million Health Net customers. Article
-
Layoffs prompt insider threat fears, cybersecurity survey finds
The 12th annual Ernst & Young Global Information Survey found senior IT professionals worried about reprisals from disgruntled employees. Article
-
Breach prevention: How to keep track of data and applications
The well-known Heartland Payment Systems breach demonstrates the importance of data security. Michael Cobb reviews which tools best monitor a company's valuable enterprise applications and keep track of where sensitive and confidential data is headin... Tip
Security Management Strategies for the CIO