Email Alerts
-
Analyst DLP study finds maturity, ranks top DLP vendors
A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies. Article | 16 Oct 2009
-
Voltage, RSA spar over tokenization, data protection
Voltage cites performance issues and the creation of a repository of cardholder data an attractive target for attackers. RSA calls Voltage's claims unfounded. Article | 02 Oct 2009
-
Twitter gets condemned by CISOs at Forrester forum
Security professionals are worried the social network could increase the threat of data leakage and cause security problems at their companies. News | 30 Sep 2009
-
Trustwave acquires data loss prevention vendor Vericept
MSSP and PCI compliance firm buys one of dwindling field of independent DLP vendors. Article | 10 Sep 2009
-
Data has become too distributed to secure, Forrester says
A Forrester Security Forum will address ways security pros can relax security policy and focus on mitigating the risks associated with employee use of Web-based tools and services. Article | 11 Aug 2009
-
Cloud-based security services should start private
When it comes to cloud-based services, security vendors often put the cart before the horse, says columnist Eric Ogren. Column | 13 Jul 2009
-
Simple information security mistakes can cause data loss, says expert
It doesn't take the latest technology to stop a data breach. Many times, your threat profile can be reduced by following these often neglected basic security practices. News | 28 May 2009
-
Organizations struggle with data leakage prevention, rights management
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective. Column | 26 May 2009
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential. Article | 29 Apr 2009
-
Attackers cash in on fundamental data handling mistakes, Verizon finds
Large data breaches are the result of sophisticated, targeted external attacks that exploit basic errors, according to the latest data breach investigation report from Verizon. Article | 15 Apr 2009
Security Management Strategies for the CIO