Email Alerts
-
Researchers say search, seizure protection may not apply to SaaS data
Researchers examining cloud computing security issues presented a number of technical and legal hurdles that Software as a Service users could face. Article
-
Vulnerabilities, regulatory compliance drive data protection market
While compliance along with risk and vulnerability management are the two headings under which security spending often falls, the ultimate goals of both is data protection. Experts explain the "serious business" that is data protection. Article
-
Simple information security mistakes can cause data loss, says expert
It doesn't take the latest technology to stop a data breach. Many times, your threat profile can be reduced by following these often neglected basic security practices. News
-
Organizations struggle with data leakage prevention, rights management
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective. Column
-
Real-world solutions for data loss prevention
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an ... E-Zine
-
How to create configuration management plans to install DLP
Installing DLP products on a network can require a lot of configuration management planning that includes cooperation between many business groups. In this security management expert response, learn how to do a network architecture review to install ... Ask the Expert
-
Data security best practices for PCI DSS compliance
The glut of recent data breaches, such as the one at Heartland Payment Systems Inc., leaves some security pros wondering if PCI DSS is doing its job. Is it worth all the effort to become PCI compliant if breaches still seem inevitable? In this expert... Tip
-
How to use (almost) free tools to find sensitive data
No matter how much security awareness training employees get, some of them will still store sensitive data in insecure places. As a security manager, finding that data becomes of paramount importance -- but how to do it? In this tip, John Soltys offe... Tip
-
HIPAA changes force healthcare to improve data flow
Do you know where your data is? The latest HIPAA changes should motivate healthcare security teams to understand information flows. Column
-
Many missed point on Ponemon data theft survey
Laid off employees aren't taking the secret formula for Coke or the clinical trial reports on a cure for cancer; they're taking their email contact lists. News
Security Management Strategies for the CIO