Email Alerts
-
Can database extrusion products effectively prevent data loss?
In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. Ask the Expert
-
Best practices for implementing a retention policy
In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise. Ask the Expert
-
PCI Council hears complaints, suggestions for changes
Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. Article
-
How to get the most out of a SIM
A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... Tip
-
Richard Clarke: Don't ignore data risks, deploy encryption
At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. Article
-
Reacting to a business partner's insider threat
In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. Ask the Expert
-
What are the pros and cons of using an email encryption gateway?
In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses the pros and cons of using an email encryption gateway to prevent data leakage. Ask the Expert
-
snooping
Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual obs... Definition
-
Google hacking (Google scanning or Engine hacking)
Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet... Definition
-
masquerade
In general, a masquerade is a disguise. Definition
Security Management Strategies for the CIO