Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Quiz: DLP deployments: Understanding your options

    This five-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this DLP deployment Security School Lesson by Kevin Beaver. 

  • Data breach prevention strategies

    This Security School lesson will establish a baseline data breach prevention strategy every enterprise should have in place. You learn about the importance of a risk assessment and defining and prioritizing potential threats based on your organizatio... 

  • Book chapter: Browser security principles, same-origin policy exceptions

    This is an excerpt from the book Web Application Security: A Beginner’s Guide that describes the intricacies of using script code within the framework of a same-origin policy. 

  • Quiz: Network content monitoring must-haves

    See if you know the essentials of network content monitoring in this SearchSecurity.com Security School quiz. 

  • Deperimeterization changing today's security practices

    Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded. 

  • Quiz: Data loss prevention

    Take this five-question quiz to test your knowledge of Rich Mogull's data loss prevention material. 

  • Quiz: E-discovery and security in the enterprise

    Take this five-question quiz to evaluate your knowledge of the e-discovery material presented in this Data Protection Security School lesson. 

  • The Craft of System Security

    In this Chapter 16 excerpt from, The Craft of System Security, authors Sean Smith and John Marchesini explain how an adversary can extract data from a device -- even after it has been 'erased.' 

  • Quiz: Executing a data governance strategy

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Russell L. Jones in this lesson of SearchSecurity.com's Data Protection Security School. 

  • Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.