By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Data security technology and strategy News
June 02, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss GDPR compliance and how the EU law will affect enterprise data privacy and security across the globe.
May 26, 2017
News roundup: The Target settlement following the 2013 data beach requires the company to adopt a stronger security program. Plus, experts knock the FCC's DDoS claim, and more.
April 14, 2017
News roundup: DARPA's SSITH program tackles hardware vulnerabilities for better security. Plus, new risks placed in OWASP Top 10, SWIFT launches new anti-fraud tool, and more.
April 07, 2017
News Roundup: 'Hand-to-hand' combat in State Department hack, APT29 has a stealth backdoor, the creator of the internet backs strong encryption, and more.
Data security technology and strategy Get Started
Bring yourself up to speed with our introductory content
Companies still struggle to adapt risk management strategies to face modern threats, but maturing their cybersecurity governance processes is a step in the right direction. Continue Reading
Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continue Reading
A system breach is inevitable, and BDS products provide a valuable means of detection. But a strategy that blends both defense and offense is the best approach to security. Continue Reading
Evaluate Data security technology and strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do ... Continue Reading
Protect your most important asset -- data -- with enterprise backup software. Use this guide to decide which is the best backup software for your organization's needs. Continue Reading
Using threat intelligence tools can help your enterprise stay one step ahead of attackers and possible threats. Learn how threat intelligence can be used in your company. Continue Reading
Manage Data security technology and strategy
Learn to apply best practices and optimize your operations.
Maintaining information privacy and security seem to be separate challenges, but in reality, each is integral to the other. Expert Kevin Beaver explains how to work toward both. Continue Reading
As mobile security threats arise, the need for identity management systems becomes more and more crucial. The right tools help IT protect company data and users alike. Continue Reading
In this excerpt from chapter 13 of Measuring and Managing Information Risk, authors Jack Freund and Jack Jones discuss information security metrics. Continue Reading
Problem Solve Data security technology and strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Thousands of MongoDB configurations were hijacked due to poor authentication practices. Expert Nick Lewis explains how organizations can properly configure their implementations. Continue Reading
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
Expert Jon Callas explains how strong the Triple DES symmetric encryption algorithm actually is and offers guidance on how it compares to other widely used block ciphers. Continue Reading