Enterprise Data Governance News
August 05, 2016
Experts find law enforcement data requests have little legal support and suggest enterprises use independent judgment when deciding whether to comply or push back.
July 13, 2016
Cloud apps and cloud customers face challenges in complying with the EU GDPR as the new data protection regulation is set to take effect in less than two years.
July 07, 2016
As the new General Data Protection Regulation privacy regulation looms, many firms face new rules and challenges to protect the privacy of EU citizens, regardless of location.
March 03, 2016
Defense Secretary Ashton Carter announces the 'Hack the Pentagon' bug bounty program and new Defense Innovation Advisory Board to be headed by Eric Schmidt.
Enterprise Data Governance Get Started
Bring yourself up to speed with our introductory content
Physical security is the protection of people and systems from damage or loss due to physical events such as fire, flood, disasters, crimes or accidents. Continue Reading
Information security is the set of business processes that protects information assets from being compromised, replicated or destroyed, regardless of its format. Continue Reading
In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Enterprise Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes takes a look at Blue Coat DLP, a single appliance data loss prevention system that works with the company's web security gateway products. Continue Reading
Expert Karen Scarfone examines the features of WinMagic's SecureDoc, a full-disk encryption product for laptops, desktops, mobile devices and servers. Continue Reading
DLP technology has evolved to include use with cloud applications and threat intelligence feeds. Expert Kevin Beaver delves into new DLP methods enterprises should consider. Continue Reading
Manage Enterprise Data Governance
Learn to apply best practices and optimize your operations.
Governance, risk management and compliance goals are tested by the proliferating use of cloud services -- and it's even worse than IT organizations think. Continue Reading
A lot of the cloud adoption in organizations has happened in an organic fashion with little to no IT involvement and even less policy oversight. In most cases, the security, policy and cloud governance model you implement will be somewhat ... Continue Reading
Self-encrypting drives can provide added security for enterprises, but they aren't without vulnerabilities. Expert Michael Cobb explains what you need to know. Continue Reading
Problem Solve Enterprise Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Several security vendors and providers have been hacked over the last year. Expert Michael Cobb explains how enterprises should prepare for a vendor hack. Continue Reading
Malware authors are using power consumption tracking-malware to eavesdrop on and attack mobile devices. Expert Nick Lewis explains the threat and how to defend against it. Continue Reading
News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices. Continue Reading