Data governance 2.0 defined: How can enterprises adapt?

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Credant helps IT shops secure mobile technology

    Product review: Though some features need work, Mobile Guardian Enterprise Edition 5.1 achieves its main mission of protecting confidential data on portable devices. 

  • RSA Security may not be the 'pearl' EMC thinks it is

    Having outbid other suitors, EMC must now sell the purchase to its shareholders and make use of RSA's technology. Will the strategy work? The 451 Group isn't sure RSA is much of a gem. 

  • Easy hacks still tripping up corporate victims

    Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC. 

  • Data theft roundup: More laptops stolen, roughly 300,000 at risk

    Three stolen laptops jeopardize the personal information of former supermarket employees, customers of Hotels.com and members of the YMCA. 

  • Does email archiving mean keep everything?

    An expert at the Storage Decisions conference weighs in on whether it makes sense to keep data forever or if reducing data also reduces risk. Plus dirt on conniving lawyers and dodgy tape practices. 

  • Security Blog Log: Data storage bills go to extremes

    This week, lawmakers miss the middle ground when it comes to how long electronic data should be stored. Meanwhile, a hacker defaces electronic subway signs to suggest prime minister is a monster. 

  • Where hard drives go to die, or do they?

    A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. 

  • Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it. 

  • New freeware takes some mystery out of rogue files

    Endpoint security provider Bit9 today unveils a free search engine that tells users a file's origin, thus helping reduce unwanted software on desktops, laptops and servers. 

  • Data leaks and losses abound

    Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus.