Data security strategies and governance
In this guide to enterprise data security strategies and governance, get advice on how to protect your enterprise information with the right data classification and protection techniques and policies.
New & Notable



Instant Download: Free Guide to Password Security
Including insights from security pros Michael Cobb, Jeremy Bergsman and Nick Lewis, gain expert advice on how to improve your password policies to keep your enterprise safe. Explore machine learning-powered techniques, how to approach mobile password management, and more.
Data security strategies and governance News
-
February 21, 2019
21
Feb'19
CrowdStrike report says breakout time for threat actors is increasing
CrowdStrike's annual global threat report highlights why speed is critical for cybersecurity defenders. Experts sound off on key findings, including the rise of 'big game hunting.'
-
February 15, 2019
15
Feb'19
Astaroth Trojan returns, abuses antivirus software
Cybereason's Nocturnus Research team has discovered a new strain of the Astaroth Trojan that attacks antivirus software to steal credentials.
-
February 07, 2019
07
Feb'19
Gartner: Expanding SOC capabilities a priority for enterprises
Reinvesting in SOCs and crafting clear risk appetite statements made the list of Gartner's top security and risk management trends. Experts sound off on what's driving these trends.
-
January 31, 2019
31
Jan'19
Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell has teamed up with CrowdStrike and Secureworks for SafeGuard and Response, a portfolio of endpoint security technology and services, to tackle the shifting threat landscape.
Data security strategies and governance Get Started
Bring yourself up to speed with our introductory content
-
How to perform an ICS risk assessment in an industrial facility
An important step to secure an industrial facility is performing an ICS risk assessment. Expert Ernie Hayden outlines the process and why each step matters. Continue Reading
-
steganography
Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Continue Reading
-
SSAE 16
The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (... Continue Reading
Evaluate Data security strategies and governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Can a zero-trust approach fill the security perimeter void?
With the enterprise perimeter a mere memory, how can enterprises hope to secure their mission-critical data and systems? Continue Reading
-
Microsegmentation security: Your key to zero trust
Zero trust is the path forward to secure corporate IT assets. Learn how to put into place a zero-trust security model with a microsegmentation strategy. Continue Reading
-
Top 10 CISO concerns for 2019 span a wide range of issues
From dealing with data and staffing shortages to adapting to an ever-expanding set of job responsibilities, CISOs face an array of serious issues in 2019. Continue Reading
Manage Data security strategies and governance
Learn to apply best practices and optimize your operations.
-
Key steps to put your zero-trust security plan into action
There are three key categories of vendor zero-trust products. Learn what they are, and how to evaluate and implement the one that's best for your company. Continue Reading
-
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations. Continue Reading
-
How does site isolation defend against Spectre vulnerabilities?
Spectre exploits how processors manage performance-enhancing features. Expert Michael Cobb explains Google Chrome's initiative to use site isolation as a defense mechanism. Continue Reading
Problem Solve Data security strategies and governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
What risks does the OpenFlow protocol vulnerability present?
Researchers found a vulnerability in OpenFlow that can cause problems. Learn how vendor-specific SDN controllers may cause these OpenFlow protocol vulnerabilities. Continue Reading
-
Implementing machine learning to keep Facebook user data safe
Facebook Director of Security Aanchal Gupta shares how the social media giant is implementing machine learning in security to ensure user data is safe on its platform. Continue Reading
-
How hackers use idle scans in port scan attacks
Hackers exploit port scan attacks to mask their identities before launching an attack. One of their favorites: the idle scan. Continue Reading