Email Alerts
-
Does email archiving mean keep everything?
An expert at the Storage Decisions conference weighs in on whether it makes sense to keep data forever or if reducing data also reduces risk. Plus dirt on conniving lawyers and dodgy tape practices. Article
-
Security Blog Log: Data storage bills go to extremes
This week, lawmakers miss the middle ground when it comes to how long electronic data should be stored. Meanwhile, a hacker defaces electronic subway signs to suggest prime minister is a monster. Column
-
Automating Network Compliance and Security
In this excerpt from Chapter 2 of "The Shortcut Guide to Automating Network Management and Compliance," author Don Jones discusses how networks become non-compliant, and examines how automation can positively impact security and compliance business p... Book Chapter
-
Where hard drives go to die, or do they?
A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. Article
-
Digital doomsday can be avoided with preparation
The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it. Article
-
How to protect your company against cybercrime
Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecurity expert and malware guru Ed Skoudis describes how... Tip
-
Data integrity authentication schemes.
In this Ask the Expert Q&A, Joel Dubin, our identity and access mangement expert examines various data integrity authentication schemes. Ask the Expert
-
New freeware takes some mystery out of rogue files
Endpoint security provider Bit9 today unveils a free search engine that tells users a file's origin, thus helping reduce unwanted software on desktops, laptops and servers. Article
-
Man-in-the-middle attacks
This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. Book Chapter
-
Protect your business from a Google hack
Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl... Tip
Security Management Strategies for the CIO