Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Data leaks and losses abound

    Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus. 

  • The Control Architecture

     

  • Storage security quiz answers

     

  • Quiz: Storage security

    Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... 

  • Effective storage security policies

    In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. 

  • Gearing up for the data security culture shift

    Experts say securing sensitive data just isn't a working habit for many employees. Forget documented corporate data policies. When the auditors (or hackers) dig deeper -- what will they really find? 

  • Indian BPO providers tighten data security

    Indian BPO providers working to protect their reputations and customer data have issued workplace security rules tighter than most in the U.S. 

  • The pros and cons of reformatting a hard drive

    In this Ask the Expert Q&A, our platform security expert discusses the pros and cons of reformatting a hard drive after an attack. 

  • Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. 

  • Content Alarm 1.1

    Learn why Information Security magazine believes t the Content Alarm 1.1 system, despite its cost is excellent at spotting plaintext leaks.