Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Database authentication, encryption getting priority in some businesses

    While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. 

  • Which Unix programs can encrypt database files?

    Options may seem slim for Unix users looking to encrypt their database files. In this expert Q&A, platform security expert Michael Cobb explains whether encrypting and decrypting an entire production database is worth it to begin with. 

  • Experts: Easing standards like PCI DSS a bad idea

    Financial services practitioners say security standards like PCI DSS can be hard to heed, but that easing them would be a bad idea given the data fraud epidemic. 

  • Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos. 

  • The trouble with Google hacking techniques

    Some IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors Group... 

  • Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. 

  • Discovering e-discovery services: How information security pros should prepare

    Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... 

  • More from SearchSecurity.com -- May 2007

    Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. 

  • Locking down database applications

    In this lesson, learn how to secure database apps by building roles and privileges and monitoring access to prevent insider abuse, plus satisfy regulators by properly segregating duties and limiting application access to sensitive database data. 

  • Data Protection Security School

    SearchSecurity.com's Data Protection Security School will help infosec professionals formulate a comprehensive strategy and pinpoint technologies that can help them secure sensitive information throughout the network -- including data in motion and d...