Why CISOs must adopt a new mentality to protect data

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BSIMM4 measures and advances secure application development

    The fourth iteration of the Building Security In Maturity Model project is a tool you can use as a measuring stick for software security initiatives. 

  • Data breach protection requires new barriers

    Assumption of breach is the new norm. Can this shift help organizations build better levels of data breach protection? 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Watching the watchers

    In this Security School lesson, expert Andreas explores how to monitor the activities of your most trusted insiders with a combination of policy, process and technology to keep unauthorized access and data loss to a minimum. 

  • Mass 201 CMR 17: Basics for security practitioners

    Massachusetts data protection law 201 CMR 17 went into effect on March 1, 2010. Get an in-depth look at the requirements of this law, and find out what needs to be done to become compliant with the law. 

  • Quiz: Data loss prevention

    Take this five-question quiz to test your knowledge of Rich Mogull's data loss prevention material. 

  • More from SearchSecurity.com -- May 2007

    Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. 

  • Database defenses for a new era of threats

    All too often, precious corporate databases containing customer records and other sensitive data are forgotten or ignored. This lesson offers an overview of the basic tools needed to secure a company's databases against today's emerging and most dang... 

  • Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... 

  • Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ...