Email Alerts
-
Which Unix programs can encrypt database files?
Options may seem slim for Unix users looking to encrypt their database files. In this expert Q&A, platform security expert Michael Cobb explains whether encrypting and decrypting an entire production database is worth it to begin with. Ask the Expert
-
Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos. Article
-
Experts: Easing standards like PCI DSS a bad idea
Financial services practitioners say security standards like PCI DSS can be hard to heed, but that easing them would be a bad idea given the data fraud epidemic. Article
-
The trouble with Google hacking techniques
Some IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors Group... Interview
-
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. Quiz
-
Discovering e-discovery services: How information security pros should prepare
Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... Tip
-
More from SearchSecurity.com -- May 2007
Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. Monthly Magazine Highligh
-
Executing a data governance strategy
Today data is siloed in many applications and databases with no documentation on how trusted it is and the relationships among applications that capture and use data. In this lesson, learn how you can remedy these issues with a mature data governance... partOfGuideSeries
-
E-discovery and security in the enterprise
partOfGuideSeries
-
Locking down database applications
In this lesson, learn how to secure database apps by building roles and privileges and monitoring access to prevent insider abuse, plus satisfy regulators by properly segregating duties and limiting application access to sensitive database data. partOfGuideSeries
Security Management Strategies for the CIO