Data governance 2.0 defined: How can enterprises adapt?

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Disaster recovery report card: Measuring your company's disaster recovery profile

    Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... 

  • Four tips for verifying that your backups work

    The only thing worse than losing data is discovering that your backups don't work in the first place. These four tips will help you verify that your backups are indeed up to snuff. 

  • Extranet security strategy considerations

    Extranets can be beneficial for conducting e-commerce, but if they aren't properly secured, they can pose serious risks to you, your business partners and customers. In this tip, our network security expert, Mike Chapple, provides four tactics for lo... 

  • How to protect your company against cybercrime

    Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecurity expert and malware guru Ed Skoudis describes how... 

  • Protect your business from a Google hack

    Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl... 

  • Six steps to beating backup server hacks

    Are your backup servers also backdoor servers? If you're not specifically addressing their vulnerabilities, they just might be. In this tip, W. Curtis Preston looks at the security issues behind backup servers and offers a quick list of things you ca... 

  • Effective storage security policies

    In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. 

  • Content Alarm 1.1

    Learn why Information Security magazine believes t the Content Alarm 1.1 system, despite its cost is excellent at spotting plaintext leaks. 

  • Protect files and folders from snoops

    Read this tip and learn about four specific steps you can take to secure your desktop files and folders. 

  • Six essential security policies for outsourcing

    Kevin Beaver outlines six essential security policies for dealing with external service providers.