Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can database extrusion products effectively prevent data loss?

    In this SearchSecurity.com Q&A, security expert Michael Cobb explains how well database extrusion products can protect an organization's stored confidential information. 

  • Best practices for implementing a retention policy

    In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise. 

  • PCI Council hears complaints, suggestions for changes

    Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. 

  • How to get the most out of a SIM

    A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... 

  • Richard Clarke: Don't ignore data risks, deploy encryption

    At a recent keynote with CISOs during the Gartner IT Security Summit, former White House cybersecurity czar Richard Clarke warned that firms are doing little to prevent data theft. 

  • Reacting to a business partner's insider threat

    In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. 

  • What are the pros and cons of using an email encryption gateway?

    In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses the pros and cons of using an email encryption gateway to prevent data leakage. 

  • snooping

    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual obs... 

  • Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet... 

  • masquerade

    In general, a masquerade is a disguise.