Email Alerts
-
BSIMM4 measures and advances secure application development
The fourth iteration of the Building Security In Maturity Model project is a tool you can use as a measuring stick for software security initiatives. Feature
-
Data breach protection requires new barriers
Assumption of breach is the new norm. Can this shift help organizations build better levels of data breach protection? Feature
-
Choosing security products: DLP technology
Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. guide
-
Watching the watchers
In this Security School lesson, expert Andreas explores how to monitor the activities of your most trusted insiders with a combination of policy, process and technology to keep unauthorized access and data loss to a minimum. guide
-
Mass 201 CMR 17: Basics for security practitioners
Massachusetts data protection law 201 CMR 17 went into effect on March 1, 2010. Get an in-depth look at the requirements of this law, and find out what needs to be done to become compliant with the law. Learning Guide
-
Quiz: Data loss prevention
Take this five-question quiz to test your knowledge of Rich Mogull's data loss prevention material. Quiz
-
More from SearchSecurity.com -- May 2007
Online content from the May 2007 edition of Information Security magazine, examining best practices for the protection of sensitive information. Monthly Magazine Highligh
-
Database defenses for a new era of threats
All too often, precious corporate databases containing customer records and other sensitive data are forgotten or ignored. This lesson offers an overview of the basic tools needed to secure a company's databases against today's emerging and most dang... partOfGuideSeries
-
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... Book Chapter
-
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ... Book Chapter
Security Management Strategies for the CIO