Blog Posts Tagged with "Data Loss Prevention"

34f0cf280cbc950bcb75cabd189b7a8d

Remote Management as a Complement to Endpoint Security

October 31, 2011 Added by:Kanguru Solutions

Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

#EntSec -- Not Business Relevant

October 26, 2011 Added by:Ali-Reza Anghaie

Enterprise Security is Not Business Relevant. Now, that's quite the inflammatory statement but unless your business is security then it's true in practice today. Before the flaming begins let me start by saying I believe firmly it ~IS~ business critical but I want to make it actually relevant...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI and the Insider Threat

October 24, 2011 Added by:PCI Guru

The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Six Security Assessments You’ve Never Had But Should

October 24, 2011 Added by:Stephen Marchewitz

You probably are familiar with the classic security assessments: internal and external penetration testing, security risk assessments, and PCI gap assessments. Consider performing these six assessments at least once in your organization to combat the constantly looming hacker threat...

Comments  (0)

07c90faf3632560a12dd6e98069813f2

Avoid Becoming a Security Statistic

October 12, 2011 Added by:Konrad Fellmann

Some organizations hoard data, but have no idea why. A business owner needs to figure out why the data needs to be kept, who will use the data, and how long it needs to be kept for business, legal or contractual reasons. Once defined, IT can implement proper controls to protect the data...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Data Loss Prevention – Technology is Just the Start

October 12, 2011 Added by:Simon Heron

The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Consumers: Just Looking for a Digital McDonalds

October 10, 2011 Added by:Javvad Malik

Unlike the comparatively simple topic of world politics, information security is not just the responsibility of the government or companies. Users need to be educated so that they are best equipped to protect their own data and to allow them to put pressure on companies who don’t protect data...

Comments  (0)

Bddcc5065237c686cb4d89dba8b276f2

The Dark Side of Collaboration

October 06, 2011 Added by:Steven Fox, CISSP, QSA

Realizing the value of security investments requires teamwork. However, corporate teams play in a competitive arena that demands flexibility and responsiveness. Managers must be ready to recognize when to use tactical collaborations for the benefit of team strategy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Develop Enhanced Security for Cloud Computing

October 06, 2011 Added by:Headlines

SICE - A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms: "We have significantly reduced the surface' that can be attacked by malicious software. Previous techniques have exposed thousands of lines of code to potential attacks..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Twenty Controls That Aren't

October 04, 2011 Added by:Infosec Island Admin

"Controls" advocate practices that simply cannot be met by the average small firm. DLP for everybody? A well-trained security staff that is expert in secure network engineering? If nothing else, this list should encourage small firms to simply outsource everything, even if it costs more...

Comments  (0)

34f0cf280cbc950bcb75cabd189b7a8d

Securing Flash Drives within the Enterprise

September 29, 2011 Added by:Kanguru Solutions

Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...

Comments  (1)

8c4834b99847b9f7c9ee94b45df086f9

Data Breaches - Beyond the Impact of Fines

September 27, 2011 Added by:Emmett Jorgensen

With several high profile breaches this year, regulators have proposed data breach notification bills and heavy fines for organizations that fail to keep sensitive information safe. The real concern for organizations that have experienced a data breach, however, is customer confidence...

Comments  (8)

37d5f81e2277051bc17116221040d51c

Signals of PC Failure and Contingency Plans

September 21, 2011 Added by:Robert Siciliano

Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Will Security Turn into a B2B Industry?

September 19, 2011 Added by:Danny Lieberman

As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Compliance Is Not Security – Busted!

September 17, 2011 Added by:PCI Guru

there is no such thing as a perfect security framework because as I have said time and again – wait for it – security is not perfect. For those of you that are implicitly selling security to your management as perfect need to stop it. You are doing the security profession a disservice...

Comments  (4)

8c4834b99847b9f7c9ee94b45df086f9

HHS to Start Auditing For HIPAA Compliance

September 14, 2011 Added by:Emmett Jorgensen

Despite both HIPAA and the HiTECH Act, healthcare data breaches have been popping up regularly. A recent study found over 70% of hospitals had data breaches last year. This has generated concern over Healthcare’s adoption of security procedures and the overall effectiveness of HIPAA...

Comments  (4)

Page « < 7 - 8 - 9 - 10 - 11 > »