Blog Posts Tagged with "Data Loss Prevention"

28a74b8d7de3373b4bed858fc10b6bf5

The Scary Realities About Your Web Data

September 08, 2010 Added by:Lori Homsher

Browser and website security may keep the data secure from customer to ecommerce site, but what happens to the data that is shared with back-end vendors? A website may be PCI compliant, but I know from experience that vendors are often missed in PCI audits...

Comments  (2)

0d27688c61c5a172e8e45956cd70cba2

A Delicate Balance: DLP and Privacy

September 07, 2010 Added by:Michael Cohen

When applying DLP to an organization’s email server, IT managers need to maintain a delicate balance between their company’s security interests and user’s privacy, which is possible through a coherent policy aligned with the management of sensitive data in all facets of the organization...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Back From Black Hat

August 06, 2010 Added by:Application Security, Inc.

With so many tracks there was no shortage of interesting topics at the same time slot. Since there were no database specific talks on the first day, I had a great opportunity to expand my horizon and check out some areas that I’m only somewhat familiar with - here's a summary...

Comments  (1)

72cc4c5e6cbde70aa374bf94076ad722

Using Information Rights Management to Prevent Snooping by IT Staff

July 09, 2010 Added by:Peter Abatan

In a recent news article a survey carried out by Cyber-Ark global survey claimed that 41% of IT pros admit to snooping on confidential information. Forty-one percent of respondents confessed to abusing administrative passwords to snoop on sensitive or confidential information...

Comments  (5)

959779642e6e758563e80b5d83150a9f

Choosing Endpoint DLP Agents

June 07, 2010 Added by:Danny Lieberman

There is a lot to be said for preventing data loss at the point of use but if you are considering endpoint DLP (data loss prevention), I recommend against buying and deploying an integrated DLP/Anti-virus end-point security agent.  This is for 4 reasons:

Comments  (2)

959779642e6e758563e80b5d83150a9f

Changing Your Security Requires Learning about Change

March 30, 2010 Added by:Danny Lieberman

Reading through the trade press, DLP vendor marketing collateral and various forums on information security,  the conventional wisdom is that the key threat to an organization is trusted insiders.

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »