Data security strategies and governance
In this guide to enterprise data security strategies and governance, get advice on how to protect your enterprise information with the right data classification and protection techniques and policies.
New & Notable
Data security strategies and governance News
-
February 25, 2021
25
Feb'21
Vastaamo breach, bankruptcy indicate troubling trend
The blackmailing of patients directly, as well as the resulting bankruptcy of Vastaamo Psychotherapy Centre, could single a shift in cyber crime tactics.
-
December 09, 2020
09
Dec'20
WatchGuard highlights critical MSP security services for 2021
MSPs in 2021 will face higher volumes of spear phishing attacks, hazardous gaps in remote work setups and a crucial need for widespread MFA adoption, WatchGuard Technologies says.
-
June 10, 2020
10
Jun'20
Maze ransomware builds 'cartel' with other threat groups
Operators behind the Maze ransomware posted data leaks from competing ransomware gangs to their victim shaming website, suggesting they have joined forces.
-
December 30, 2019
30
Dec'19
BigID: New privacy regulations have ended 'the data party'
New privacy laws are changing data management practices in the enterprise. BigID co-founder Nimrod Vax discusses the importance of being 'data native' in the era of the CCPA.
Data security strategies and governance Get Started
Bring yourself up to speed with our introductory content
-
honeypot (computing)
A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems. Continue Reading
-
Cyber insurance 101: Timely guidance on an essential tool
No one hopes for a breach, but as they become more common, any responsible cybersecurity team must anticipate one. One key element: choosing the right cyber insurance policy. Continue Reading
-
Data protection impact assessment tips and templates
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information. Continue Reading
Evaluate Data security strategies and governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Threat detection and response tools evolve and mature
A variety of threat detection and response tools, such as XDR, are evolving into platforms to help enterprises share information and stay ahead of cybersecurity threats. Continue Reading
-
The ultimate guide to cybersecurity planning for businesses
This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their IT systems from attacks. Continue Reading
-
Editor's picks: Top cybersecurity articles of 2020
As the year no one could have predicted comes to a close, SearchSecurity takes a 30,000-foot view of the cybersecurity trends and challenges that defined the last 12 months. Continue Reading
Manage Data security strategies and governance
Learn to apply best practices and optimize your operations.
-
3 post-SolarWinds supply chain security best practices
Following the devastating SolarWinds breach, IT leaders should renew their focus on third-party risk management. Start by implementing supply chain security best practices. Continue Reading
-
4 tips for aligning security with business objectives
Today's most effective CISOs develop cybersecurity strategies that fit their organizations' risk appetites and support business growth. Learn how they do it. Continue Reading
-
4 ways to minimize the risk of IT supply chain attacks
Mark Whitehead breaks down the importance of taking a zero-trust cybersecurity approach when it comes to protecting networks and data accessible by third-party partners. Continue Reading
Problem Solve Data security strategies and governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to address and prevent security alert fatigue
An influx of false positive security alerts can lead infosec pros to overlook real threats. Learn how to avoid security alert fatigue and avoid its potential consequences. Continue Reading
-
Data sanitization techniques: Standards, practices, legislation
An effective data sanitization process lessens the chance that your organization's valuable data could be stolen or compromised, and enhances compliance. Continue Reading
-
Addressing the expanding threat attack surface from COVID-19
CISOs need to ensure they and their security teams are aware of the new threats created by many businesses expanding their attack surface with many employees still working remotely. Continue Reading