Email Alerts
-
Adopt Zero Trust to help secure the extended enterprise
Forrester Analyst John Kindervag explains Zero Trust Model and how it can be applied to protect data in today’s extended enterprise. Tip
-
EDRM-DLP combination could soon bolster document security management
The integration of enterprise digital rights management solutions and data loss prevention tools could bring a level of automation to document security management. Tip
-
How to know if you need file activity monitoring to track file access
Is file activity monitoring, a new product meant to integrate with DLP to provide more granular file access tracking, right for your enterprise? Tip
-
Data sanitization policy: How to ensure thorough data scrubbing
Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip. Tip
-
Resist credit card data compromise threats due to memory-scraping malware
PCI DSS does a good job of making sure credit card data in persistent storage is secure, however, such data in non-persistent storage -- such as files stored temporarily in memory -- can still be vulnerable to compromise, particularly via memory-scra... Tip
-
Five endpoint DLP deployment data security tips
Deploying data loss prevention technology on endpoints requires a careful roll-out. Expert Rich Mogull offers five tips, including the need to start slowly with a set of power users and how to manage endpoint discovery. Tip
-
Considerations for buying and implementing DLP solutions
Financial institutions are looking to data loss prevention solutions to prevent costly data security breaches. In this tip, Dave Shackleford explains key issues to weigh before buying and installing a DLP product. Tip
-
Breach prevention: How to keep track of data and applications
The well-known Heartland Payment Systems breach demonstrates the importance of data security. Michael Cobb reviews which tools best monitor a company's valuable enterprise applications and keep track of where sensitive and confidential data is headin... Tip
-
Data protection tips for corporate compliance leaders
Author Rebecca Herold explains why compliance professionals need to understand data protection issues in order to successfully do their job. Tip
-
Cyberwarfare and the enterprise: Is the threat real?
Recently, there has been a great deal of press about massive botnets and killer denial-of-service attacks. So how concerned should you really be about cyberwarfare? The threat is real, says contributor Sherri Davidoff, but the underlying problems are... Tip
Security Management Strategies for the CIO