Manage
Learn to apply best practices and optimize your operations.
Data security strategies and governance
How to keep track of sensitive data with a data flow map
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
Six criteria for buying data loss prevention products
Expert Bill Hayes lays out six steps to take in order to buy the right data loss protection (DLP) products for your organization. Continue Reading
Three usage scenarios for deploying data loss prevention products
Expert Bill Hayes details usage scenarios for deploying data loss prevention: standalone suites, integrated tools and standalone/integrated DLP combined. Continue Reading
-
The business case for email encryption software
Email encryption is a valuable security tool for enterprises, but where and how should it be deployed? Expert Karen Scarfone outlines specific use cases for email encryption software. Continue Reading
A CISO's introduction to enterprise data governance strategy
Every enterprise must have a viable strategy for protecting high-value data. See if your plan aligns with Francoise Gilbert's advice on top priorities to consider when defining data governance plans. Continue Reading
Does your enterprise need a data loss prevention system?
Not every business needs a data loss prevention system. Security expert Rich Mogull offers clues to help your organization decide if DLP will suit its business needs.Continue Reading
Using metadata tagging tools for PCI DSS compliance
Metadata tagging is not just for security. Expert Mike Chapple explains how tagging tools can be used to achieve PCI DSS compliance.Continue Reading
Data governance 2.0: Adapting to a new data governance framework
Data governance 2.0, an updated enterprise data governance framework, brings challenges and opportunities. Henry Peyret of Forrester Research details.Continue Reading
Protecting Intellectual Property: Best Practices
Organizations need to implement best practices to protect their trade secrets from both internal and external threats.Continue Reading
Risk management must include physical-logical security convergence
-
Using a managed file transfer for secure data transmission, exchange
Removable Storage Security: ControlGuard Access Manager 3.0 review
Log management and analysis: How, when and why
In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture.Continue Reading
Book chapter: Browser security principles, same-origin policy exceptions
This is an excerpt from the book Web Application Security: A Beginner’s Guide that describes the intricacies of using script code within the framework of a same-origin policy.Continue Reading
EDRM-DLP combination could soon bolster document security management
The integration of enterprise digital rights management solutions and data loss prevention tools could bring a level of automation to document security management.Continue Reading