Email Alerts
-
Data sanitization policy: How to ensure thorough data scrubbing
Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip. Tip
-
Unmasking data masking techniques in the enterprise
Patch-testing and development environments can't use live data and keep it secure. That's where data masking comes in. Michael Cobb examines the principles behind data masking and why security pros should endorse its use in order to keep production d... Tip
-
How to use a PDF redaction tool with a redacted document policy
It may seem rudimentary, but sensitive data commonly leaks out of corporate networks in plain sight in the form of un-redacted documents. Such files -- those still containing hidden data or Microsoft "Track Changes" data -- can potentially lead to se... Tip
-
How to choose online data backup services for data protection
SaaS-based data backup cuts costs and management overhead, but you're not outsourcing your security responsibilities. Tip
-
How to protect distributed information flows
In a book excerpt from "The Shortcut Guide to Prioritizing Security Spending," author Dan Sullivan explains how to get a handle on enterprise data that may be moving around the globe. Tip
-
Interpreting 'risk' in the Massachusetts data protection law
After many changes, it appears that the recent Massachusetts data protection law is here to stay. Contributor David Navetta reviews the important, ambiguous places in the legislation that your legal and compliance teams must zero in on in order to av... Tip
-
PCI DSS compliance requirements: Ensuring data integrity
Want to make sure you have secure data for PCI DSS? One of the first steps is making sure the data you're trying to secure is the right data. Security management expert David Mortman explains how to ascertain and maintain data integrity. Tip
-
Workstation hard drive encryption: Overdue or overkill?
In an age of high-profile data breaches and insider risks, encryption is an important defense mechanism for enterprises. The question is: how much encryption is necessary? Many security pros have gone to great lengths to protect data on network serv... Tip
-
How to avoid DLP implementation pitfalls
Data leak prevention tools effectively reduce the chances that an enterprise's sensitive data will end up where it shouldn't, but several pitfalls can severely curtail a DLP tool's effectiveness. In this tip, Rich Mogull offers several best practices... Tip
-
Easing e-discovery preparation by mapping enterprise data
With a well-planned data retention policy, an organization can often avoid tracking down old data when served with an e-discovery request. In this tip, Stephen Foskett highlights the linchpin of a data retention policy, the ESI map, including what it... Tip
Security Management Strategies for the CIO