Blog Posts Tagged with "Data Loss Prevention"


Controlling Valuable Data By Using Maps

November 10, 2011 Added by:Brent Huston

As the battle rages, attackers look for every angle they can leverage in order to access your data. Our team has spent countless hours discussing the importance of identifying what ‘valuable data’ means, learning where that data lives, and understanding how it is accessed...

Comments  (0)


Five Information Security Issues We All Face Today

November 09, 2011 Added by:Bozidar Spirovski

Technology has done a great deal for changing the way we live and do business today. While the benefits are numerous, however, there have been challenges that come with that development. Here’s a look at some of the information security issues we all face...

Comments  (0)


Remote Management as a Complement to Endpoint Security

October 31, 2011 Added by:Kanguru Solutions

Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...

Comments  (0)


#EntSec -- Not Business Relevant

October 26, 2011 Added by:Ali-Reza Anghaie

Enterprise Security is Not Business Relevant. Now, that's quite the inflammatory statement but unless your business is security then it's true in practice today. Before the flaming begins let me start by saying I believe firmly it ~IS~ business critical but I want to make it actually relevant...

Comments  (0)


PCI and the Insider Threat

October 24, 2011 Added by:PCI Guru

The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...

Comments  (0)


Six Security Assessments You’ve Never Had But Should

October 24, 2011 Added by:Stephen Marchewitz

You probably are familiar with the classic security assessments: internal and external penetration testing, security risk assessments, and PCI gap assessments. Consider performing these six assessments at least once in your organization to combat the constantly looming hacker threat...

Comments  (0)


Avoid Becoming a Security Statistic

October 12, 2011 Added by:Konrad Fellmann

Some organizations hoard data, but have no idea why. A business owner needs to figure out why the data needs to be kept, who will use the data, and how long it needs to be kept for business, legal or contractual reasons. Once defined, IT can implement proper controls to protect the data...

Comments  (0)


Data Loss Prevention – Technology is Just the Start

October 12, 2011 Added by:Simon Heron

The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...

Comments  (1)


Consumers: Just Looking for a Digital McDonalds

October 10, 2011 Added by:Javvad Malik

Unlike the comparatively simple topic of world politics, information security is not just the responsibility of the government or companies. Users need to be educated so that they are best equipped to protect their own data and to allow them to put pressure on companies who don’t protect data...

Comments  (0)


The Dark Side of Collaboration

October 06, 2011 Added by:Steven Fox, CISSP, QSA

Realizing the value of security investments requires teamwork. However, corporate teams play in a competitive arena that demands flexibility and responsiveness. Managers must be ready to recognize when to use tactical collaborations for the benefit of team strategy...

Comments  (0)


Researchers Develop Enhanced Security for Cloud Computing

October 06, 2011 Added by:Headlines

SICE - A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms: "We have significantly reduced the surface' that can be attacked by malicious software. Previous techniques have exposed thousands of lines of code to potential attacks..."

Comments  (0)


The Twenty Controls That Aren't

October 04, 2011 Added by:Infosec Island Admin

"Controls" advocate practices that simply cannot be met by the average small firm. DLP for everybody? A well-trained security staff that is expert in secure network engineering? If nothing else, this list should encourage small firms to simply outsource everything, even if it costs more...

Comments  (0)


Securing Flash Drives within the Enterprise

September 29, 2011 Added by:Kanguru Solutions

Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...

Comments  (1)


Data Breaches - Beyond the Impact of Fines

September 27, 2011 Added by:Emmett Jorgensen

With several high profile breaches this year, regulators have proposed data breach notification bills and heavy fines for organizations that fail to keep sensitive information safe. The real concern for organizations that have experienced a data breach, however, is customer confidence...

Comments  (8)


Signals of PC Failure and Contingency Plans

September 21, 2011 Added by:Robert Siciliano

Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...

Comments  (0)


Will Security Turn into a B2B Industry?

September 19, 2011 Added by:Danny Lieberman

As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »