Email Alerts
-
NitroSecurity covers its bases with RippleTech deal
NitroSecurity Inc. will integrate log management and database activity monitoring with security incident and event management (SIEM). Article
-
Quiz: E-discovery and security in the enterprise
Take this five-question quiz to evaluate your knowledge of the e-discovery material presented in this Data Protection Security School lesson. Quiz
-
Easing e-discovery preparation by mapping enterprise data
With a well-planned data retention policy, an organization can often avoid tracking down old data when served with an e-discovery request. In this tip, Stephen Foskett highlights the linchpin of a data retention policy, the ESI map, including what it... Tip
-
Growing Mac use prompts call for better security
Some vendors, including Check Point and PGP see growth in whole-disk encryption for Mac OS X laptops on enterprise platforms. Article
-
Web 2.0 and e-discovery: Risks and countermeasures
Enterprise employees often love Web 2.0 services like wikis and social networking services, but the data employees may create with or provide to those services can put an enterprise at risk, especially when litigation calls for electronic discovery o... Tip
-
How can we convince our VP that a network-based DLP makes sense?
Pitching data leak prevention security technology to a vice president can be tricky, but security management expert Mike Rothman gives tips on how to get funding without creating unrealistic expectations. Ask the Expert
-
Screencast: Recovering lost data with WinHex
WinHex is a forensics tool that allows users to examine running programs, wipe confidential files or unused space, and perform drive imaging and drive cloning. In this secreencast Peter Giannoulis of http://theacademy.ca shows you how to use WinHex t... Tip
-
Websense, Reconnex top Forrester ranking of DLP vendors
The data leakage prevention market is branching out into automating data classification, analysis and device management, according to a report from Forrester Research Inc. Article
-
Countermeasures against targeted attacks in the enterprise
Security organizations often struggle to compensate for unknowing employees who fall victim to social engineering attacks. It's the unenviable job of information security to prevent that from happening. In this tip, Markus Jakobsson details the ills ... Tip
-
To what exactly would a request for biometric data from an insurance provider pertain?
Biometric data serves only to verify identity. Identity and expert management expert Joel Dubin explains what an insurance company might want with biometric data. Ask the Expert
Security Management Strategies for the CIO