Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Data sanitization policy: How to ensure thorough data scrubbing

    Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip. 

  • Unmasking data masking techniques in the enterprise

    Patch-testing and development environments can't use live data and keep it secure. That's where data masking comes in. Michael Cobb examines the principles behind data masking and why security pros should endorse its use in order to keep production d... 

  • How to use a PDF redaction tool with a redacted document policy

    It may seem rudimentary, but sensitive data commonly leaks out of corporate networks in plain sight in the form of un-redacted documents. Such files -- those still containing hidden data or Microsoft "Track Changes" data -- can potentially lead to se... 

  • How to choose online data backup services for data protection

    SaaS-based data backup cuts costs and management overhead, but you're not outsourcing your security responsibilities. 

  • How to protect distributed information flows

    In a book excerpt from "The Shortcut Guide to Prioritizing Security Spending," author Dan Sullivan explains how to get a handle on enterprise data that may be moving around the globe. 

  • Interpreting 'risk' in the Massachusetts data protection law

    After many changes, it appears that the recent Massachusetts data protection law is here to stay. Contributor David Navetta reviews the important, ambiguous places in the legislation that your legal and compliance teams must zero in on in order to av... 

  • PCI DSS compliance requirements: Ensuring data integrity

    Want to make sure you have secure data for PCI DSS? One of the first steps is making sure the data you're trying to secure is the right data. Security management expert David Mortman explains how to ascertain and maintain data integrity. 

  • Workstation hard drive encryption: Overdue or overkill?

    In an age of high-profile data breaches and insider risks, encryption is an important defense mechanism for enterprises. The question is: how much encryption is necessary? Many security pros have gone to great lengths to protect data on network serv... 

  • How to avoid DLP implementation pitfalls

    Data leak prevention tools effectively reduce the chances that an enterprise's sensitive data will end up where it shouldn't, but several pitfalls can severely curtail a DLP tool's effectiveness. In this tip, Rich Mogull offers several best practices... 

  • Easing e-discovery preparation by mapping enterprise data

    With a well-planned data retention policy, an organization can often avoid tracking down old data when served with an e-discovery request. In this tip, Stephen Foskett highlights the linchpin of a data retention policy, the ESI map, including what it...