Email Alerts
-
Trustwave acquires data loss prevention vendor Vericept
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors. Article
-
deperimeterization
In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication. Definition
-
Data has become too distributed to secure, Forrester says
A Forrester Security Forum will address ways security pros can relax security policy and focus on mitigating the risks associated with employee use of Web-based tools and services. Article
-
Cloud-based security services should start private
When it comes to cloud-based services, security vendors often put the cart before the horse, says columnist Eric Ogren. Column
-
Compliance in the cloud
Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security. Video
-
Deperimeterization changing today's security practices
Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded. Royal Holloway eBook Seri
-
How to write technology outsourcing contracts
Have you decided to outsource services but are afraid the company you outsource to may have a data breach? In this expert response, learn how to write technology outsourcing contracts that designate liability if there's a customer data breach. Ask the Expert
-
Simple information security mistakes can cause data loss, says expert
It doesn't take the latest technology to stop a data breach. Many times, your threat profile can be reduced by following these often neglected basic security practices. News
-
Organizations struggle with data leakage prevention, rights management
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective. Column
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential. Article
Security Management Strategies for the CIO