Blog Posts Tagged with "Data Loss Prevention"
October 31, 2011 Added by:Kanguru Solutions
Both Endpoint Security and the Remote Management of connectable devices are powerful applications all by themselves, individually, but if you strategically combine them, so much more is possible. It's another great way to keep your living, breathing, beast of a network secure...
October 26, 2011 Added by:Ali-Reza Anghaie
Enterprise Security is Not Business Relevant. Now, that's quite the inflammatory statement but unless your business is security then it's true in practice today. Before the flaming begins let me start by saying I believe firmly it ~IS~ business critical but I want to make it actually relevant...
October 24, 2011 Added by:PCI Guru
The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...
October 24, 2011 Added by:Stephen Marchewitz
You probably are familiar with the classic security assessments: internal and external penetration testing, security risk assessments, and PCI gap assessments. Consider performing these six assessments at least once in your organization to combat the constantly looming hacker threat...
October 12, 2011 Added by:Konrad Fellmann
Some organizations hoard data, but have no idea why. A business owner needs to figure out why the data needs to be kept, who will use the data, and how long it needs to be kept for business, legal or contractual reasons. Once defined, IT can implement proper controls to protect the data...
October 12, 2011 Added by:Simon Heron
The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...
October 10, 2011 Added by:Javvad Malik
Unlike the comparatively simple topic of world politics, information security is not just the responsibility of the government or companies. Users need to be educated so that they are best equipped to protect their own data and to allow them to put pressure on companies who don’t protect data...
October 06, 2011 Added by:Steven Fox, CISSP, QSA
Realizing the value of security investments requires teamwork. However, corporate teams play in a competitive arena that demands flexibility and responsiveness. Managers must be ready to recognize when to use tactical collaborations for the benefit of team strategy...
October 06, 2011 Added by:Headlines
SICE - A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms: "We have significantly reduced the surface' that can be attacked by malicious software. Previous techniques have exposed thousands of lines of code to potential attacks..."
October 04, 2011 Added by:Infosec Island Admin
"Controls" advocate practices that simply cannot be met by the average small firm. DLP for everybody? A well-trained security staff that is expert in secure network engineering? If nothing else, this list should encourage small firms to simply outsource everything, even if it costs more...
September 29, 2011 Added by:Kanguru Solutions
Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...
September 27, 2011 Added by:Emmett Jorgensen
With several high profile breaches this year, regulators have proposed data breach notification bills and heavy fines for organizations that fail to keep sensitive information safe. The real concern for organizations that have experienced a data breach, however, is customer confidence...
September 21, 2011 Added by:Robert Siciliano
Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...
September 19, 2011 Added by:Danny Lieberman
As businesses become more and more interconnected, as cloud services percolate deeper and deeper into organizations, and as government compliance regulation becomes more complex and pervasive, the security “problem” becomes more difficult to solve and even harder to sell...
September 17, 2011 Added by:PCI Guru
there is no such thing as a perfect security framework because as I have said time and again – wait for it – security is not perfect. For those of you that are implicitly selling security to your management as perfect need to stop it. You are doing the security profession a disservice...
September 14, 2011 Added by:Emmett Jorgensen
Despite both HIPAA and the HiTECH Act, healthcare data breaches have been popping up regularly. A recent study found over 70% of hospitals had data breaches last year. This has generated concern over Healthcare’s adoption of security procedures and the overall effectiveness of HIPAA...
The Benefits of FUD... willy ben on 08-21-2014
Mobile Security: Tips for Using Personal Dev... sikawai duluan on 08-20-2014
Security Risks of Telecommuting... Marek Hudczak on 08-18-2014