Email Alerts
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
Enterprise data management: Analyzing business processes and infrastructure for data protection
Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection Security School, guest instructor Russell L. Jones exp... Tip
-
How to test an e-commerce Web site's security and privacy defenses
Assessing the security of e-commerce sites means checking up on their associated servers, databases and applications. In this expert response, Michael Cobb explains where to start. Ask the Expert
-
Should confidential data be indexed or used as the index key?
A recent attack uses a series of insert operations to find weaknesses in the database's indexing algorithm. Michael Cobb explains the nature of the threat and what it means for customer data. Ask the Expert
-
Trend Micro acquires Provilla for data protection
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday. Article
-
Quiz: Executing a data governance strategy
A five-question multiple-choice quiz to test your understanding of the content presented by expert Russell L. Jones in this lesson of SearchSecurity.com's Data Protection Security School. Quiz
-
Seagate pushes hard drive encryption to the data center
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready? Article
-
McAfee acquires SafeBoot for endpoint encryption
McAfee is acquiring endpoint encryption vendor SafeBoot Corp. in a $350 million deal to bolster the antivirus vendor's mobile device security software. Article
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
Security Management Strategies for the CIO