Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Four tips for verifying that your backups work

    The only thing worse than losing data is discovering that your backups don't work in the first place. These four tips will help you verify that your backups are indeed up to snuff. 

  • Extranet security strategy considerations

    Extranets can be beneficial for conducting e-commerce, but if they aren't properly secured, they can pose serious risks to you, your business partners and customers. In this tip, our network security expert, Mike Chapple, provides four tactics for lo... 

  • How to protect your company against cybercrime

    Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecurity expert and malware guru Ed Skoudis describes how... 

  • Protect your business from a Google hack

    Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl... 

  • Six steps to beating backup server hacks

    Are your backup servers also backdoor servers? If you're not specifically addressing their vulnerabilities, they just might be. In this tip, W. Curtis Preston looks at the security issues behind backup servers and offers a quick list of things you ca... 

  • Effective storage security policies

    In this tip, information security expert Kevin Beaver outlines essential policy creation processes along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop or overlooked altogether. 

  • Content Alarm 1.1

    Learn why Information Security magazine believes t the Content Alarm 1.1 system, despite its cost is excellent at spotting plaintext leaks. 

  • Protect files and folders from snoops

    Read this tip and learn about four specific steps you can take to secure your desktop files and folders. 

  • Six essential security policies for outsourcing

    Kevin Beaver outlines six essential security policies for dealing with external service providers. 

  • How permanent is your storage solution?

    Electronic files, retained to comply with regulations or for other business reasons, are vulnerable to viruses and changing media formats. What should you do?