Data governance 2.0 defined: How can enterprises adapt?

Enterprise Data Governance

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • snooping

    Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual obs... 

  • Google hacking (Google scanning or Engine hacking)

    Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet... 

  • masquerade

    In general, a masquerade is a disguise. 

  • cut-and-paste attack

    A cut-and-paste attack is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed. 

  • Are encryption products better than self-destructing data?

    Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." 

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. 

  • Two men plead guilty in supermarket data security breach

    Two Los Angeles area men plead guilty to using devices to bilk debit and credit card data from Stop & Shop supermarkets in Massachusetts and Rhode Island. 

  • Springing leaks: Getting smart about data loss prevention

    Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. 

  • What should be done with a RAID-5 array's failed drives?

    Even one failed drive in a RAID-5 array can present an enterprise with serious data protection concerns. In this Q&A, expert Michael Cobb explains which policies can protect and recover RAID-5 data. 

  • How secure are document scanners and other 'scan to email' appliances?

    Copiers and document scanners have always posed challenges for information security teams. In this Q&A, Michael Cobb reveals how the right policies can control the use (and abuse) of these devices.