Email Alerts
-
Executing a data governance strategy
Today data is siloed in many applications and databases with no documentation on how trusted it is and the relationships among applications that capture and use data. In this lesson, learn how you can remedy these issues with a mature data governance... partOfGuideSeries
-
E-discovery and security in the enterprise
partOfGuideSeries
-
How to verify 140-2 (FIPS 140-2) compliance
In this SearchSecurity.com Q&A, identity management and access control expert, Joel Dubin, discuses several ways to verify that Federal Information Processing Standard 140-2 is being enforced. Ask the Expert
-
SaaS offering a first for Symantec
Symantec has launched a beta of the Protection Network, a software-as-a-service platform for small-to-medium-sized businesses. Resellers will be able to offer customized versions. Article
-
How to enforce a data destruction policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael ... Ask the Expert
-
IBM uses model to understand data governance
Steven Adler, program director of Data Governance Solutions for IBM and chairman of the Data Governance Council, has been working to understand the growing need for data security, the issues surrounding data compliance and data protection problems. I... Interview
-
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. Article
-
Online game exploits threaten IT security
Gary McGraw, chief technology officer of Dulles, Va.-based security firm Cigital Inc., is a security luminary with several books to his credit, including "Software Security: Building Security In," "Java Security" and "Exploiting Software." His latest... Interview
-
Unlocking best practices for successful encryption key management
The importance of encryption has long been obvious to security professionals, but the complexity of encryption key management can be almost as daunting as the cryptography algorithms themselves. In this tip, W. Curtis Preston examines today's primary... Tip
-
How does a privacy seal protect an ecommerce Web site?
Can a privacy seal protect your ecommerce Web site, or is it just a useful marketing tool? In this expert Q&A, identity management and access control expert Joel Dubin explains how well privacy seals actually protect a site's customer data. Ask the Expert
Security Management Strategies for the CIO