Email Alerts
-
Countdown: Plugging the dam -- Understanding where and how content leaks
This expert Podcast counts down the top 5 different use cases in which data can leak as a result of outdated data handling policies, and what you can do to make sure these situations don't put your organization in an exposed position. Podcast
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
-
Richard Clarke: Don't ignore data risks, deploy encryption
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. Article
-
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Article
-
Database authentication, encryption getting priority in some businesses
While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. Article
-
TJX: Data breach damage $25 million and counting
The massive data breach at TJX caused the retail giant to suffer a 1% earnings loss in the first quarter of 2007, the company said Tuesday. Article
-
TJX breach tied to Wi-Fi exploits
The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls. Article
-
Oracle patches 36 holes
Oracle Corp. on Tuesday issued patches for 36 holes in the database management system, application server, E-Business Suite and JD Edwards and PeopleSoft software. Article
-
Oracle to patch 37 flaws
Database giant Oracle Corp. offered a preview of its April Critical Patch Update (CPU). Fixes are planned for 37 flaws across its product line. Article
-
Google boosts privacy, but storage glut continues
Google is right in making its server log data anonymous after 18-24 months. But the mammoth amount of data being collected is still a major concern. Column
Security Management Strategies for the CIO