Email Alerts
-
Reacting to a business partner's insider threat
In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. Ask the Expert
-
What is a logic bomb?
A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. Ask the Expert
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
How to enforce a data destruction policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael ... Ask the Expert
-
How to create guidelines for using removable storage devices
Removable storage devices often sneak past the security radar; Expert Shon Harris explains how to incorporate portable storage into your organization's security policy. Ask the Expert
-
The pros and cons of data wiping
Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Platform Security Ask the Expert Q&A Ask the Expert
-
How to properly protect and retain data
Improperly securing, and storing, data can lead to a plethora of problems, including productivity degradation and non-compliance. Learn how to properly protect, and retain your corporate data in this security management Ask the Expert Q&A. Ask the Expert
-
Common methods of securing data
Ask the Expert
-
Preventing unauthorized downloads
Ask the Expert
Security Management Strategies for the CIO