Email Alerts
-
Hardware-based encryption gains most innovation of '07
New types of technologies that emerged in 2007 addressed data leakage at the endpoint and helped reduce the problem of data simply walking out the door. Article
-
Should CS2 applications be downloaded to a removable drive?
Even though U3 smart drives can execute Windows-based applications directly, the devices can introduce security risks into the enterprise. Michael Cobb lays out the pros and cons of the technology. Ask the Expert
-
Will one failed drive corrupt the rest of a RAID-5 array?
In this expert Q&A, Michael Cobb explains when it is appropriate to keep a RAID-5 array's failed drive online. Ask the Expert
-
Will an off-site employee exit procedure violate HIPAA regulations?
In this expert response, Mike Rothman discusses if it is a HIPAA violation to discuss clients or handle business matters in a public environment. Ask the Expert
-
Should an IT staff be concerned with a network's physical security?
Fifty feet outside of an office building may be a manhole that contains all the fiber that connects you to the outside world. In this expert Q&A, Mike Chapple has some advice: "Don't obsess about it." Ask the Expert
-
With data breach costs soaring, companies should review data sharing policies
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey. Article
-
Product focus evolves in volatile data loss prevention market
Various tools and methods are emerging in the DLP market even as that market undergoes consolidation. Article
-
The Craft of System Security
In this Chapter 16 excerpt from, The Craft of System Security, authors Sean Smith and John Marchesini explain how an adversary can extract data from a device -- even after it has been 'erased.' Book Chapter
-
What are the security risks of a corporate divestiture?
Security management expert Mike Rothman discusses the data protection issues involved with a corporate divestiture . Ask the Expert
-
Can data anonymization ensure privacy of Web application user data?
There are many regulations requiring an organization to protect the personally identifiable information (PII) that it may collect. In this tip, Michael Cobb explains why it may not be too early for data anonymization techniques to help protect Web ap... Ask the Expert
Security Management Strategies for the CIO