Enterprise Data Governance News
December 09, 2014
Trustwave says one out of every five organizations has no controls in place to prevent sensitive data exposure, despite growing criminal interest.
November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
September 19, 2014
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
June 17, 2013
Opinion: Gary McGraw details the various and sundry NSA data collection programs and explains why all its efforts demand new discussion and scrutiny.
Enterprise Data Governance Get Started
Bring yourself up to speed with our introductory content
The term 'data loss prevention' can be difficult to understand as it is used very broadly in the security industry. Learn the true definition of DLP and uncover why it is often the cause of confusion. Continue Reading
Data loss prevention (DLP) can be a confusing technology. Security expert Rich Mogull discusses the difference between DLP and DLP lite, as well as the ins and outs of content analysis. Continue Reading
In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk. Continue Reading
Evaluate Enterprise Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security expert Rich Mogull outlines the four elements of a DLP tool: the central management server, network monitoring, storage and endpoint DLP. Continue Reading
Not every business needs a data loss prevention system. Security expert Rich Mogull offers clues to help your organization decide if DLP will suit its business needs. Continue Reading
Checking out data loss prevention tools? This guide will help you along every step, from understanding how DLP works to sealing the purchasing deal. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: Data cleansing and address validation are the most valuable features. Also the web services which can be called on the fly....Continue Reading
Ensure you invest in training early. You need someone with prior experience on your team – if not, use consultants.Powered by IT Central Station
Valuable Features: SAP ERP and Salesforce.com integration. • Improvements to My Organization: We now have a single ETL tool for...Continue Reading
Easy to use, but a lot of versions over the years which makes it hard to sync up with older versions of the same tool.Powered by IT Central Station
Valuable Features: Scalability and easy to use. • Room for Improvement: There are a lot of version improvements in the years...Continue Reading
Manage Enterprise Data Governance
Learn to apply best practices and optimize your operations.
Metadata tagging is not just for security. Expert Mike Chapple explains how tagging tools can be used to achieve PCI DSS compliance. Continue Reading
Bitcoin security may not be a top enterprise concern at the moment, but it may soon be. Michael Cobb explains how to ensure crypto-currency safety. Continue Reading
Data governance 2.0, an updated enterprise data governance framework, brings challenges and opportunities. Henry Peyret of Forrester Research details. Continue Reading
Problem Solve Enterprise Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Tenable CSO Marcus Ranum says Target-like breaches occurred even with PCI compliance because PCI established only a minimal set of requirements. Continue Reading
Expert Michael Cobb explains the advantages of digital watermarking and analyzes whether improved data security is one of them. Continue Reading
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security. Continue Reading