Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to protect distributed information flows

    In a book excerpt from "The Shortcut Guide to Prioritizing Security Spending," author Dan Sullivan explains how to get a handle on enterprise data that may be moving around the globe. 

  • Interpreting 'risk' in the Massachusetts data protection law

    After many changes, it appears that the recent Massachusetts data protection law is here to stay. Contributor David Navetta reviews the important, ambiguous places in the legislation that your legal and compliance teams must zero in on in order to av... 

  • How to destroy data on a hard drive to comply with HIPAA regulations

    Looking to destroy HIPAA data on a hard drive? Learn the best way to destroy a hard drive to comply with HIPAA regulations in this expert response from David Mortman. 

  • How to protect employee information in email paystubs

    Many companies are moving to a system of paperless paystubs. Learn how to protect the information contained in these email paystubs with the use of secure email in this expert response. 

  • Creating an enterprise data protection framework

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. 

  • Analyst DLP study finds maturity, ranks top DLP vendors

    A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies. 

  • data masking

    Data masking is a method of creating a structurally similar but inauthentic version of an organization's data that can be used for purposes such as software testing and user training. The purpose is to protect the actual data while having a functiona... 

  • Voltage, RSA spar over tokenization, data protection

    Voltage cites performance issues and the creation of a repository of cardholder data an attractive target for attackers. RSA calls Voltage's claims unfounded. 

  • Twitter gets condemned by CISOs at Forrester forum

    Security professionals are worried the social network could increase the threat of data leakage and cause security problems at their companies. 

  • PCI DSS compliance requirements: Ensuring data integrity

    Want to make sure you have secure data for PCI DSS? One of the first steps is making sure the data you're trying to secure is the right data. Security management expert David Mortman explains how to ascertain and maintain data integrity.