Email Alerts
-
Workstation hard drive encryption: Overdue or overkill?
In an age of high-profile data breaches and insider risks, encryption is an important defense mechanism for enterprises. The question is: how much encryption is necessary? Many security pros have gone to great lengths to protect data on network serv... Tip
-
Windows BitLocker: Enabling disk encryption for data protection
With Windows Vista, Microsoft introduced a whole-disk encryption mechanism called BitLocker. The feature has enabled Windows to provide better data protection, but the tool is not without drawbacks. Contributor Tony Bradley stacks BitLocker up agains... Tip
-
Storage vulnerabilities you can't afford to miss
In this tip, Keavin Beaver identifies eight common storage security vulnerabilites that are often overlooked and examines why network admins should develop a layered security strategy to protect sensitive data. Tip
-
Encryption strategies for preventing laptop data leaks
The majority of enterprise notebook computers contain sensitive information. Should those devices fall into the wrong hands, encryption can keep the data safe. Expert Lisa Phifer discusses the pros and cons of today's notebook data encryption methods... Tip
-
PCI Data Security Standard compliance: Setting the record straight
Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... Tip
-
Considerations for encryption and compliance
It's often thought that a wide-ranging encryption implementation can prevent data loss and satisfy compliance mandates. Reality, of course, is more complex. Contributor Trent Henry discusses the pros and cons of various encryption strategies, as well... Tip
-
Unlocking best practices for successful encryption key management
The importance of encryption has long been obvious to security professionals, but the complexity of encryption key management can be almost as daunting as the cryptography algorithms themselves. In this tip, W. Curtis Preston examines today's primary... Tip
-
Leveraging database security investments
Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m... Tip
-
Hashing for fun and profit: Demystifying encryption for PCI DSS
These days there's no excuse for failing to encrypt sensitive data like credit card information, but the numerous types of cryptography, such as hashing, available can make implementation confusing. Learn how merchants are affected by the encryption ... Tip
-
Laptop security essentials: Protecting device data, even from admins?
In this ITKnowledge Exchange thread, information security pros explain how to prevent unauthorized access, but question whether measures should be put in place to protect data from admins. Tip
Security Management Strategies for the CIO