Email Alerts
-
How to prevent hack attacks against smart card systems.
What are smart cards, and how can the security of a smart card itself be maintained? Ask the Expert
-
Why are there still various independent credit card security standards?
PCI DSS has become the well-known information security standard for credit cards, but vendors can still have different approaches to card data security. Ask the Expert
-
How can birth certificate fraud and passport fraud be prevented?
Best practices for preventing birth certificate and passport fraud from expert Mike Rothman. Ask the Expert
-
How can a CSO determine if a company has a data security problem?
In this SearchSecurity.com Q&A, security management expert Mike Rothman examines certain areas that a CSO should focus on, such as internal policy documents and penetration test results, to determine if a corporation has a data security breach proble... Ask the Expert
-
Using privacy filters to guard computer screens
In this SearchSecurity.com Q&A, security expert Joel Dubin offers different methods on how to protect your computer screen from roaming eyes. Ask the Expert
-
Do information leak prevention products protect critical data?
Can one product really protect your enterprise from an information leak? In this expert Q&A, Mike Chapple examines the content protection market and warns users to keep realistic expectations. Ask the Expert
-
Should full disk encryption be used to prevent data loss?
According to a Ponemon Institute survey done in August 2006, eighty-one percent of companies reported the loss of one or more laptops during a 12 month period. In this SearchSecurity.com Q&A, platform security Michael Cobb explains whether that means... Ask the Expert
-
How to get management interested in an information security program
When it comes to firing up an information security program, are your execs sitting on their hands? In this expert Q&A, security management pro Shon Harris reveals how to speak the language of senior management. Ask the Expert
-
Should log traffic be encrypted?
Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this SearchSecurity.com expert Q&A. Ask the Expert
-
What enterprise tools can scan files for sensitive data?
Given the many recent high-profile data breaches, organizations seem keen on securing their sensitive data, including credit card and social security numbers. In this expert Q&A, SearchSecurity.com's Mike Chapple reviews tools that can scan text-base... Ask the Expert
Security Management Strategies for the CIO