Blog Posts Tagged with "Data Loss Prevention"

8e6e3972318ff74b194801340248199e

DLP and Business Needs

April 16, 2013 Added by:Scott Thomas

Most non-IT people know about DLP only when the IT organization contacts them to let them know they did something they shouldn't have. For those of us that have to deal with the policies, the alerts, and sending those notices, it can be more complicated.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Resilience - Healthcare edition (Part 2: Risk Classification)

January 31, 2013 Added by:Rafal Los

Before you tell me that risk classifications are important, water is wet, the sun is hot and ice is cold, I'd like to remind you how many enterprises still do it poorly. I almost wish it was a simple as data telling you it's critical or not, but let's face it the game is very rarely that simple...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Implementing a Data De-Identification Framework

January 29, 2013 Added by:Rebecca Herold

Marketing organizations salivate at the prospects of doing advanced analysis with such data to discover new trends and marketing possibilities. The government wants to use it for investigations. Historians want to use it for, yes, marking historical events. And the list could go on...

Comments  (0)

4eb356e09746aadc2f4800877e8c24e8

Mobile App Security Series: It’s 10pm. Do you know where your data is?

January 16, 2013 Added by:Brandon Knight

Mobile devices continue to pick up steam on becoming the primary device that many people use for email, web browsing, social media and even shopping. As we continue installing app after app which we then put our personal information in to the question is how secure are these apps?

Comments  (0)

959779642e6e758563e80b5d83150a9f

Using brainware to store patient data and ensure patient privacy

October 16, 2012 Added by:Danny Lieberman

If pharmaceutical companies can access data from patients, then they can design and manufacture better products. This is good for patient health but problematic for current regulation of patient privacy. There is no such thing as patient privacy once big commercial ventures like large pharmas get involved...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Auditing Healthcare IT Security with Multiple Threat Scenarios

October 10, 2012 Added by:Danny Lieberman

For small to mid-size hospitals, nursing homes, medical device, healthcare IT vendors will have a much simpler audit and will be primarily interested in how cheaply the audit can be done and how much they can save using the technique of multiple threat analysis...

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

Online Banking: A Trust Opportunity to (Re)gain?

October 09, 2012 Added by:Mikko Jakonen

How come banks are telling people to maintain their security better, without putting their OWN reputation and capabilities in line with the DIRECT consequences of the change paradigm towards ‘webalized’ approach we have witnessed for years, has now resulted as poor operational security...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Landmark Ruling: Insiders Aren't Hacking if You Gave them Access

October 08, 2012 Added by:Rafal Los

What happens if you go perusing through your corporate file-share lists, applications directories and such... and find some interesting stuff that you aren't technically supposed to have access to yet the controls in place have no problem giving you permission? Does anyone notice?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Security: Tips for Using Personal Devices at Work

October 08, 2012 Added by:Robert Siciliano

If you as an employee of a hospital use your personal device at work and also use it outside of work and it gets lost or stolen, then YES, you and the hospital would be in a great deal of hot water in the event that mobile device was lost...

Comments  (19)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Trend Grows as Security Issues Escalate

October 07, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Three Keys to Managing Firewalls for Better Security

September 25, 2012 Added by:Richard Stiennon

The that firewalls do not provide value had its first incarnation in de-perimeterization. The idea is that because network security is so hard we should give up and focus on securing the endpoints and data that travels between them. In reality we have to defend four separate domains...

Comments  (1)

4de72ea3c29fd5b60b5b95627242871a

Data is the New Perimeter for Cloud Security

September 12, 2012 Added by:Mike Gault

The security market in 2012 is estimated at $60 billion, yet adding more layers of perimeter security may be completely useless against a determined sysadmin working on the inside. The end result is that your data might or might not be secure – you simply have no way to prove it...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (0)

25c95f8b408153139da509683b7b6603

Whitelisting Traffic: A practical Exercise for Network Defenders

September 04, 2012 Added by:Johannes Ullrich, Ph.D.

Host-based intrusion detection has seen some significant advances and it has come to encompass a lot more than what we currently understand as "anti-virus" or "anti-malware". All too often we still mirror network-based intrusion detection and are looking for signatures of "badness"...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Best Practices for the Destruction of Digital Data

August 31, 2012 Added by:Ben Rothke

The need for effective media destruction is imperative given that digital media is the crown jewels of most organizations. From payroll, financial records, to personal information and company/trade secrets, there are terabytes of data that at the end of its lifecycle, needs to be effectively sanitized...

Comments  (0)

82ac4cd789b46af43c0cde730625317e

Why Data Security and Enterprise Risk Management are Important

August 28, 2012 Added by:Christopher Rodgers

Management sometimes assumes that when they have identified and summarized the top risks to their organization through a Strategic Risk Assessment, that they have implemented ERM. This is simply not the case. Strategic Risk Assessment is an important component of ERM and usually a starting point, but not a final destination...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »