Email Alerts
-
How does steganography work and does it threaten enterprise data?
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Answer
-
The pros and cons of SSL decryption for enterprise network monitoring
Expert Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring method. Answer
-
How to protect sensitive data when executives travel abroad
Concerned about data theft when enterprise executives travel? Security expert Nick Lewis details how to protect sensitive data when execs go abroad. Answer
-
Avoiding a breach by a third-party data recovery services provider
Expert Nick Lewis discusses the security requirements enterprises should establish when selecting a third-party data recovery services provider. Answer
-
Detecting covert channels to prevent enterprise data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis. Answer
-
Is laptop remote wipe needed for effective laptop data protection?
Expert Michael Cobb explains how laptop remote wipe technology can ease data loss fears, but shouldn’t be solely relied upon. Answer
-
Negotiating an IT security budget for a data loss prevention tool
If your enterprise is considering a DLP purchase, read this expert response for advice on getting the information security budget to buy the best product possible. Ask the Expert
-
Will technologies like Vanish help create archived, unreadable data?
Self-destructing data is a nice thought, says Michael Cobb, but we're some ways off from achieving reliable document control of this kind. Ask the Expert
-
How to secure USB ports on Windows machines
A readers asks expert Michael Cobb about which product can best secure USB ports. Ask the Expert
-
Will a database anonymization implementation succeed?
Platform security expert Michael Cobb reviews the likelihood of success in a database anonymization implementation. Ask the Expert
Security Management Strategies for the CIO