Email Alerts
-
DLP monitoring: Defining policies to monitor data
DLP monitoring policies help define what data to evaluate, how data monitoring processes should occur, and what enforcement and alerting actions to take. Tip
-
Effective DLP products need data discovery and data fingerprinting
Effective DLP products must be able to handle data discovery to identify and monitor sensitive data. Learn why these features matter. Tip
-
Choosing security products: DLP technology
Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. guide
-
Assumption of breach: How a new mindset can help protect critical data
By adopting the assumption-of-breach security model, CISOs and security pros can better protect critical data. Expert Ernie Hayden explains. Tip
-
Protect intellectual property with data breach prep, cost analysis
Heidi Shey of Forrester Research says enterprises must protect intellectual property better or else face 'death by 1,000 cuts.' Tip
-
Why advanced malware detection is key to cut through 'network noise'
Video: Wolfgang Kandek, CTO at Qualys, discusses the need for advanced malware detection as true enterprise threats are being lost in "network noise." Video
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Answer
-
Stolen credentials, basic security lapses at core of 2012 breaches
Social engineering attacks and stolen passwords are giving attackers unfettered access to corporate systems for extended periods of time. News
-
Study finds firms lagging in health care privacy, data security protections
Inadequate security controls, a heavy use of cloud-based services, and employee negligence are resulting in multiple breaches at the same firms. News
-
Phishing attack, stolen credentials sparked South Carolina breach
A phishing attack and stolen credentials gave an attacker access to the systems of the South Carolina Department of Revenue for two months. News
Security Management Strategies for the CIO