Email Alerts
-
RSA SecurID breach fallout should be limited, experts say
Experts say the risk of an attack that exploits stolen proprietary data on RSA's SecurID products is low, but it can't be completely dismissed until attack details are revealed. Article
-
Auditors choose encryption over tokenization for data security, survey finds
A Ponemon Institute survey of more than 500 auditors finds most prefer data encryption over tokenization to protect sensitive data. Article
-
Data loss prevention best practices start with slow, incremental rollouts
Early adopters of DLP deployments say slow, incremental rollouts help reduce the burden on IT staff and the potential for chaos among business units. Article
-
Social networking best practices for preventing social network malware
Get advice on social networking security best practices that can help prevent data leaks and other social network malware that could harm to your enterprise. Ask the Expert
-
Data sanitization policy: How to ensure thorough data scrubbing
Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip. Tip
-
Realign your data protection strategy efforts
In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business. Video
-
user account provisioning
User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system. To be effective, an account provisioning process should ensure that the creation of accounts and provisioning of ... Definition
-
Forrester's advice for data governance maturity model success
Forrester Research Senior Analyst Andrew Jaquith gives advice for data governance maturity model success and why enterprises should do more than just follow a standardized set of guidelines to protect data. Video
-
Midmarket financial firms grapple with internal, external security threats
Midmarket financial firms, struck hard by global economic concerns, are facing a challenging threat environment while trying to trim operational costs – a process that is putting further strain on IT security professionals. News
-
Validating ERP system security and ERP best practices
Is your ERP system security effective? How can you be sure? Expert Mike Cobb offers up some ERP security best practices. Ask the Expert
Security Management Strategies for the CIO