Email Alerts
-
How to create configuration management plans to install DLP
Installing DLP products on a network can require a lot of configuration management planning that includes cooperation between many business groups. In this security management expert response, learn how to do a network architecture review to install ... Ask the Expert
-
Are encrypted, self-deleting USB storage drives worth the investment?
Expert Michael Cobb explains why some high-end, encrypted, self-deleting USB drives are worth looking into and may be a good investment. Ask the Expert
-
Can you combine RFID tag technology with GPS to track stolen goods?
When laptops or smartphones are stolen, retrieving them can mean the difference between a data breach a close call. Learn if it's possible to combine RFID tag technology with GPS devices for tracking stolen goods to their exact location, and if so ho... Ask the Expert
-
How to create a policy to avoid disgruntled employee data leaks
When crafting a data security policy, take into account that disgruntled employees may leak data. Learn how to prevent employee data leakage, and how to handle data loss if it occurs. Ask the Expert
-
Will a platform-as-a-service (PaaS) environment put data at risk?
Platform-as-a-service is the next step in the evolution of Web services. But is it secure? Security expert Michael Cobb sets the record straight? Ask the Expert
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
-
Reacting to a business partner's insider threat
In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. Ask the Expert
Security Management Strategies for the CIO