Data governance 2.0 defined: How can enterprises adapt?

Enterprise Data Governance

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Indian BPO providers tighten data security

    Indian BPO providers working to protect their reputations and customer data have issued workplace security rules tighter than most in the U.S. 

  • The pros and cons of reformatting a hard drive

    In this Ask the Expert Q&A, our platform security expert discusses the pros and cons of reformatting a hard drive after an attack. 

  • Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. 

  • Content Alarm 1.1

    Learn why Information Security magazine believes t the Content Alarm 1.1 system, despite its cost is excellent at spotting plaintext leaks. 

  • Attack: USB could be the death of me

    Seemingly innocent Universal Serial Bus driver bugs may allow device attacks that many won't see coming, according to Black Hat presenters. 

  • Combining technology and social engineering: Hacking behind bars

    In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with technology. 

  • Protect files and folders from snoops

    Read this tip and learn about four specific steps you can take to secure your desktop files and folders. 

  • Six essential security policies for outsourcing

    Kevin Beaver outlines six essential security policies for dealing with external service providers. 

  • ID theft remains No. 1 worry

    For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. 

  • How permanent is your storage solution?

    Electronic files, retained to comply with regulations or for other business reasons, are vulnerable to viruses and changing media formats. What should you do?