Email Alerts
-
Can data anonymization ensure privacy of Web application user data?
There are many regulations requiring an organization to protect the personally identifiable information (PII) that it may collect. In this tip, Michael Cobb explains why it may not be too early for data anonymization techniques to help protect Web ap... Ask the Expert
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can be accessed. Ask the Expert
-
Enterprise data management: Analyzing business processes and infrastructure for data protection
Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection Security School, guest instructor Russell L. Jones exp... Tip
-
How to test an e-commerce Web site's security and privacy defenses
Assessing the security of e-commerce sites means checking up on their associated servers, databases and applications. In this expert response, Michael Cobb explains where to start. Ask the Expert
-
Should confidential data be indexed or used as the index key?
A recent attack uses a series of insert operations to find weaknesses in the database's indexing algorithm. Michael Cobb explains the nature of the threat and what it means for customer data. Ask the Expert
-
Trend Micro acquires Provilla for data protection
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday. Article
-
Quiz: Executing a data governance strategy
A five-question multiple-choice quiz to test your understanding of the content presented by expert Russell L. Jones in this lesson of SearchSecurity.com's Data Protection Security School. Quiz
-
Seagate pushes hard drive encryption to the data center
Seagate wants to extend full disk encryption to hardware, but is the enterprise ready? Article
-
McAfee acquires SafeBoot for endpoint encryption
McAfee is acquiring endpoint encryption vendor SafeBoot Corp. in a $350 million deal to bolster the antivirus vendor's mobile device security software. Article
-
Is third-party software the only way to prevent access within a domain group?
Identity management and access control expert Joel Dubin discusses how to prevent administrator access to certain documents within a domain group. Ask the Expert
Security Management Strategies for the CIO