Email Alerts
-
Trend Micro to address DLP after analyst report criticizes strategy
Trend Micro CEO Eva Chen said the company plans further development to its data leakage protection product, integrating it with its threat management appliance. Article
-
How to secure USB ports on Windows machines
A readers asks expert Michael Cobb about which product can best secure USB ports. Ask the Expert
-
DLP technology challenges security costs
Data leakage prevention requires more than just flipping a switch. If not implemented properly, DLP could return alerts that stymie business units and increase operational costs Column
-
Defining DLP
The rash of information thefts, security breaches and data loss incidents in recent years has driven the development of a new breed of products designed to prevent sensitive data from making its way out of enterprise networks. But there is a lot of c... Video
-
Analyst DLP study finds maturity, ranks top DLP vendors
A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies. Article
-
Data protection tips for corporate compliance leaders
Author Rebecca Herold explains why compliance professionals need to understand data protection issues in order to successfully do their job. Tip
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation. Ask the Expert
-
Trustwave acquires data loss prevention vendor Vericept
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors. Article
-
Are there still Google Desktop security problems?
Expert Michael Cobb explains why Google Desktop's "search across computers" feature has been so controversial. Ask the Expert
-
Cyberwarfare and the enterprise: Is the threat real?
Recently, there has been a great deal of press about massive botnets and killer denial-of-service attacks. So how concerned should you really be about cyberwarfare? The threat is real, says contributor Sherri Davidoff, but the underlying problems are... Tip
Security Management Strategies for the CIO