Data governance 2.0 defined: How can enterprises adapt?

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to lock down USB devices

    USB devices, thumb drives, flash drives -- whatever you call them, portable media present a significant challenge for enterprises, as they enable easier data transport for mobile workers, but are often the cause for catastrophic data leaks. In this t... 

  • Data loss prevention from the inside out

    Corporate information loss can often be credited to a company's internal organization, or lack thereof. In other words, in order to prevent data leakage, corporations must not only eliminate external threats, but also internal processes that could en... 

  • Information protection: Using Windows Rights Management Services to secure data

    Keeping confidential information under wraps is paramount in any business, but finding the right mix of tools or techniques is a common challenge. In this tip, contributor Tony Bradley explains how Windows Rights Management Services (WRMS) can help e... 

  • Enterprise data management: Analyzing business processes and infrastructure for data protection

    Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection Security School, guest instructor Russell L. Jones exp... 

  • PCI Data Security Standard compliance: Setting the record straight

    Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... 

  • Investigating logic bomb attacks and their explosive effects

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this tip from SearchSecurity.com's Ask the Expert section, Ed Skoudis explains how an enterprise can prepare for a hacker's ... 

  • How to get the most out of a SIM

    A security information management product is perhaps one of the least exciting types of information security products available today, but it can be one of the most beneficial. According to expert Joel Snyder, an organization should look beyond the t... 

  • Discovering e-discovery services: How information security pros should prepare

    Recent changes to the federal regulations governing the disclosure of electronic information during litigation have changed e-discovery rules and the role that information security professionals play in the e-discovery process. But there's no need to... 

  • Unlocking best practices for successful encryption key management

    The importance of encryption has long been obvious to security professionals, but the complexity of encryption key management can be almost as daunting as the cryptography algorithms themselves. In this tip, W. Curtis Preston examines today's primary... 

  • IT compliance success doesn't equal security success

    While compliance needs may help boost an information security department's budget, using the compliance card to receive more funding can cause more harm than good. In this tip, contributor Khalid Kark, Senior Analyst at Forrester Research explains wh...