Email Alerts
-
Data leaks and losses abound
Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus. Article
-
The Control Architecture
Security Architectural Mo
-
Storage security quiz answers
Security Quiz Answer
-
Quiz: Storage security
Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... Security Quiz
-
Effective storage security policies
In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. Tip
-
Gearing up for the data security culture shift
Experts say securing sensitive data just isn't a working habit for many employees. Forget documented corporate data policies. When the auditors (or hackers) dig deeper -- what will they really find? Article
-
Indian BPO providers tighten data security
Indian BPO providers working to protect their reputations and customer data have issued workplace security rules tighter than most in the U.S. Article
-
The pros and cons of reformatting a hard drive
In this Ask the Expert Q&A, our platform security expert discusses the pros and cons of reformatting a hard drive after an attack. Ask the Expert
-
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Book Excerpt
-
Content Alarm 1.1
Learn why Information Security magazine believes t the Content Alarm 1.1 system, despite its cost is excellent at spotting plaintext leaks. Tip
Security Management Strategies for the CIO