Email Alerts
-
deperimeterization
In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication. Definition
-
Data has become too distributed to secure, Forrester says
A Forrester Security Forum will address ways security pros can relax security policy and focus on mitigating the risks associated with employee use of Web-based tools and services. Article
-
Cloud-based security services should start private
When it comes to cloud-based services, security vendors often put the cart before the horse, says columnist Eric Ogren. Column
-
Compliance in the cloud
Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security. Video
-
Deperimeterization changing today's security practices
Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded. Royal Holloway eBook Seri
-
How to write technology outsourcing contracts
Have you decided to outsource services but are afraid the company you outsource to may have a data breach? In this expert response, learn how to write technology outsourcing contracts that designate liability if there's a customer data breach. Ask the Expert
-
Simple information security mistakes can cause data loss, says expert
It doesn't take the latest technology to stop a data breach. Many times, your threat profile can be reduced by following these often neglected basic security practices. News
-
Organizations struggle with data leakage prevention, rights management
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective. Column
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential. Article
-
Attackers cash in on fundamental data handling mistakes, Verizon finds
Large data breaches are the result of sophisticated, targeted external attacks that exploit basic errors, according to the latest data breach investigation report from Verizon. Article
Security Management Strategies for the CIO