Enterprise Data Governance News
July 23, 2015
The National Guard reported an accidental data exposure affecting thousands of former and current employees was not related to the OPM breach.
June 12, 2015
Gartner predicts that by 2020 the rise of the Internet of Things will have far reaching effects on information security, including IoT security forcing better planning in physical safety and data handling.
May 08, 2015
News roundup: Contradicting mobile malware statistics published this year prove the mobile malware debate is alive and well. Plus: SAP vulnerabilities; spam-sending Linux malware; criminal attacks leading healthcare threat.
April 27, 2015
At an RSA Conference 2015 discussion on healthcare data security, experts with decades of experience perceive a unique challenge, while security pros see similarities with other verticals.
Enterprise Data Governance Get Started
Bring yourself up to speed with our introductory content
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money. Continue Reading
Evaluate Enterprise Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes lays out six steps to take in order to buy the right data loss protection (DLP) products for your organization. Continue Reading
Data loss prevention (DLP) can help any organization where the loss of sensitive information could seriously impact continued operation, explains Bill Hayes. Continue Reading
Expert Karen Scarfone examines the features of Check Point Full Disk Encryption, an FDE product for securing client devices such as laptops and desktops. Continue Reading
Manage Enterprise Data Governance
Learn to apply best practices and optimize your operations.
Expert Bill Hayes details usage scenarios for deploying data loss prevention: standalone suites, integrated tools and standalone/integrated DLP combined. Continue Reading
Email encryption is a valuable security tool for enterprises, but where and how should it be deployed? Expert Karen Scarfone outlines specific use cases for email encryption software. Continue Reading
Every enterprise must have a viable strategy for protecting high-value data. See if your plan aligns with Francoise Gilbert's advice on top priorities to consider when defining data governance plans. Continue Reading
Problem Solve Enterprise Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Remote wipe is the option most people think of when looking to erase data on mobile phones, but it isn't always the most effective. Expert Nick Lewis explores how to fully remove data from a device. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading
Tenable CSO Marcus Ranum says Target-like breaches occurred even with PCI compliance because PCI established only a minimal set of requirements. Continue Reading