Email Alerts
-
The advantages of digital watermarking in enterprise data protection
Expert Michael Cobb explains the advantages of digital watermarking and analyzes whether improved data security is one of them. Answer
-
Monitor outbound traffic: Full-packet capture or only capture network flow data?
If an enterprise can't afford to implement full-packet capture, expert Mike Chapple recommends trying to capture network flow data instead. Answer
-
How penetration testing helps ensure a secure data store
A third-party penetration test is the best way to determine whether an online data store can be compromised. Answer
-
Automated file and registry monitoring tools for Windows
A file and registry monitoring tool like Process Monitor can help IT organizations identify suspicious behavior that may be related to a malware infection. Answer
-
How to protect intellectual property from hacker theft
More hackers are targeting corporate IP over SSNs and card data. Expert Nick Lewis explains how to protect intellectual property in the enterprise. Answer
-
Social networking best practices for preventing social network malware
Get advice on social networking security best practices that can help prevent data leaks and other social network malware that could harm to your enterprise. Ask the Expert
-
Validating ERP system security and ERP best practices
Is your ERP system security effective? How can you be sure? Expert Mike Cobb offers up some ERP security best practices. Ask the Expert
-
DBMS security: Data warehouse advantages
Are there data warehouse advantages in regard to security? Without question. Michael Cobb explains. Ask the Expert
-
Will technologies like Vanish help create archived, unreadable data?
Self-destructing data is a nice thought, says Michael Cobb, but we're some ways off from achieving reliable document control of this kind. Ask the Expert
-
HIPAA and Social Security numbers in a hospital computer network
Learn when Social Security numbers can be used for patient identification without violating HIPAA patient confidentiality requirements. Ask the Expert
Security Management Strategies for the CIO