Enhanced threat detection: The next (front) tier in security

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Web 2.0 and e-discovery: Risks and countermeasures

    Enterprise employees often love Web 2.0 services like wikis and social networking services, but the data employees may create with or provide to those services can put an enterprise at risk, especially when litigation calls for electronic discovery o... 

  • Security breach management: Planning and preparation

    All organizations face the risk of an information security breach. While it can be a gut-wrenching ordeal, learning how to manage a breach can make it much easier to contain the damage. In this tip, contributor Khalid Kark unveils several key priorit... 

  • Worst practices: Recognizing the biggest compliance mistakes

    With all of the compliance requirements and regulations organizations need to abide by these days, corporate compliance blunders are inevitable. In this tip, security management expert Mike Rothman highlights the biggest compliance mistakes seen in t... 

  • The security risks of Google Notebook

    Security practitioners know to keep sensitive information under lock and key, but, as Web services proliferate, ensuring information remains private is more difficult than ever. In this tip, Ed Skoudis examines how one of Google's latest Web applica... 

  • The TJX data security breach: 10-K filing shows IAM and compliance mistakes

    Analysis of TJX's recent 10-K regulatory filing with the Securities and Exchange Commission exposes the company's lack of basic security and non-compliance with industry standards. But as Joel Dubin writes, a closer look highlights lessons from which... 

  • PCI compliance after the TJX data breach

    The massive TJX data breach reinforced the need for stricter controls when handling credit card information. In this tip, Joel Dubin reexamines the need for the PCI Data Security Standard and advises how to ease the PCI compliance burden. 

  • Lessons learned from TJX: Best practices for enterprise wireless encryption

    The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers proved that intruders can easily take advantage of unprote... 

  • Encryption strategies for preventing laptop data leaks

    The majority of enterprise notebook computers contain sensitive information. Should those devices fall into the wrong hands, encryption can keep the data safe. Expert Lisa Phifer discusses the pros and cons of today's notebook data encryption methods... 

  • PCI Data Security Standard compliance: Setting the record straight

    Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... 

  • CISSP certification can serve as introduction to regulatory compliance

    The CISSP is widely considered a valuable baseline certification for information security professionals, but its coursework can also be a valuable introduction to the complex world of regulatory compliance. As certification expert Peter H. Gregory ex...