Email Alerts
-
E-discovery management: How IT should interact with the legal team
Amid the growing important of electronic discovery, it's critical that an organization's IT team strike a good working relationship with its legal team. But this can be un-chartered territory for IT personnel. In this tip, contributor Trent Henry sup... Tip
-
How to secure an FTP connection
Network security expert Mike Chapple offers three tips that enable an FTP connection without opening up an enterprise to security risks. Ask the Expert
-
How to prevent software piracy
Security management pro Mike Rothman discusses several ways organizations can prevent software piracy and protect their intellectual property. Ask the Expert
-
Symantec fills gap with whole disk storage encryption
Symantec added whole disk and removable storage encryption to its portfolio through a partnership with GuardianEdge, working to strengthen its competitive position. Article
-
How to protect DNS servers
The DNS database is the world's largest distributed database, but unfortunately, DNS was not designed with security in mind. Application security expert Michael Cobb explains how to keep a DNS server from being hijacked. Ask the Expert
-
Data loss prevention (DLP) tools: The new way to prevent identity theft?
Despite advances in perimeter technologies, data theft has become common in today's enterprises. To protect their confidential information, some security professionals are turning to an emerging technology category: data loss prevention. But don't th... Tip
-
Is DLP coming of age? Reconnex hopes to ease path
Firms have grappled with DLP, but after a hard experience, ING's Andre Gold tells why it may be ready for prime time. Meanwhile, Reconnex says its new product can ease the path. Article
-
How to lock down USB devices
USB devices, thumb drives, flash drives -- whatever you call them, portable media present a significant challenge for enterprises, as they enable easier data transport for mobile workers, but are often the cause for catastrophic data leaks. In this t... Tip
-
Data loss prevention from the inside out
Corporate information loss can often be credited to a company's internal organization, or lack thereof. In other words, in order to prevent data leakage, corporations must not only eliminate external threats, but also internal processes that could en... Tip
-
Information protection: Using Windows Rights Management Services to secure data
Keeping confidential information under wraps is paramount in any business, but finding the right mix of tools or techniques is a common challenge. In this tip, contributor Tony Bradley explains how Windows Rights Management Services (WRMS) can help e... Tip
Security Management Strategies for the CIO