Data security and privacy
Secure data storage, data loss prevention and encryption are must-have components of any enterprise security strategy, especially as data threats and breaches become increasingly common. Get advice on these topics, along with the latest data security strategies, data backup and recovery info, and more.
Top Stories
-
News
04 Feb 2025
AMD, Google disclose Zen processor microcode vulnerability
AMD said CVE-2024-56161, which first leaked last month, requires an attacker to have local administrator privileges as well as developed and executed malicious microcode. Continue Reading
By- Alexander Culafi, Senior News Writer
-
Podcast
30 Jan 2025
Risk & Repeat: DeepSeek security issues emerge
The introduction of DeepSeek's new generative AI models has been met with fervor, but security issues have created apparent challenges for the Chinese startup. Continue Reading
By- Alexander Culafi, Senior News Writer
-
E-Zine
02 Oct 2017
Growing data protection risks and how to manage them
Companies today collect more data from more sources than ever before. Often the data is distributed across on-premises environments, cloud systems and third-party networks. The network perimeter behind which most enterprise data once resided is gone, and users now have the ability to access data from anywhere and at any time via laptops, smartphones and other mobile devices. Managing these data protection risks creates unique challenges for CISOs and their security teams.
"Security must be able to protect the data wherever it is being used, viewed or saved," said Christopher Pierson, executive vice president, general counsel and CSO at Viewpost, an electronic payments and invoicing service, based in Maitland, Fla.
For organizations covered by regulations such as PCI DSS, HIPAA, the Gramm-Leach-Bliley Act and, soon, the European Union General Data Protection Regulation, the trends pose enormous compliance headaches. The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging.
At the same time, many companies have network-level security models that prevent their security teams from transitioning to data-level controls. In this issue of Information Security magazine, we look at data-centric security models and better ways to manage data protection risks.
Continue Reading -
News
29 Sep 2017
Deloitte hack compromised sensitive emails, client data
News roundup: During the Deloitte hack, attackers had access to client data and internal email servers. Plus, the U.S. asks China not to enforce its Cybersecurity Law, and more. Continue Reading
By- Madelyn Bacon, TechTarget
- 28 Sep 2017
-
Podcast
21 Sep 2017
Risk & Repeat: Equifax data breach fallout continues
In this week's Risk & Repeat podcast, SearchSecurity editors continue discussing the Equifax data breach and examine new details about an Apache Struts flaw tied to the attack. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
15 Sep 2017
Symantec Data Loss Prevention: Product overview
Expert Bill Hayes checks out the Symantec Data Loss Prevention suite, featuring an architecture consisting of content-aware detection servers, endpoint agents and unified management. Continue Reading
By -
News
13 Sep 2017
Equifax breach response deemed insufficient in multiple ways
Experts criticized the Equifax breach response as insufficient, given the size and scope of the data loss, and they said the company was likely not prepared for such an incident. Continue Reading
By- Michael Heller, TechTarget
-
Podcast
13 Sep 2017
Risk & Repeat: Equifax data breach response called into question
In this week's Risk & Repeat podcast, SearchSecurity editors tackle the massive Equifax data breach and how the credit bureau's response to the security incident is creating more problems. Continue Reading
By- Rob Wright, Senior News Director
-
News
08 Sep 2017
Equifax breach exposes 143 million consumers' personal data
A massive Equifax breach, which was discovered in July, exposed the personal information, including names, birth dates and Social Security numbers, of 143 million Americans. Continue Reading
By- Rob Wright, Senior News Director
-
News
17 Aug 2017
NotPetya ransomware impact costs Maersk hundreds of millions
Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue. Continue Reading
By- Michael Heller, TechTarget
-
Security School
17 Aug 2017
CISSP Domain 2: Asset security
This Security School will help prepare you for Domain 2 of the CISSP exam, providing overviews of data encryption methods, data ownership concepts and asset protection. Continue Reading
-
Tip
08 Aug 2017
Why data fidelity is crucial for enterprise cybersecurity
Cybersecurity teams can't be effective if they don't trust their data. Expert Char Sample explains the importance of data fidelity and the threat of cognitive hacking. Continue Reading
By- Char Sample, ICF International
-
Answer
07 Aug 2017
How did flaws in WhatsApp and Telegram enable account takeovers?
Flaws in WhatsApp and Telegram, popular messaging services, enable attackers to break encryption and take over accounts. Expert Michael Cobb explains how the attacks work. Continue Reading
By -
Answer
04 Aug 2017
Could the WannaCry decryptor work on other ransomware strains?
Researchers created WannaCry decryptor tools after the outbreak of the ransomware. Expert Matthew Pascucci explains how the tools work and if they work on other ransomware. Continue Reading
-
Podcast
28 Jul 2017
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
25 Jul 2017
ASLR side-channel attack: How is JavaScript used to bypass protection?
Researchers have developed an ASLR Cache side-channel attack that enables them to eliminate ASLR protections. Expert Nick Lewis explains how JavaScript code is used in the attack. Continue Reading
By -
Guide
21 Jul 2017
What data loss prevention systems and tactics can do now
Setting up systems to preventing data loss is a must for companies of all sizes. Learn the basics of and what's new in data loss prevention and how to keep your DLP system humming. Continue Reading
-
Tip
20 Jul 2017
Tools to transfer large files: How to find and buy the best
Need to transfer files within headquarters or between branches? Managed file transfer tools now offer some interesting new features. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
News
18 Jul 2017
Another AWS data leakage due to misconfiguration
Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error. Continue Reading
By- Michael Heller, TechTarget
-
News
14 Jul 2017
AWS S3 bucket leak exposes millions of Verizon customers' data
News roundup: An AWS S3 bucket leak containing personal data of millions of Verizon customers was exposed to the public. Plus, DNC hack victims are suing the Trump campaign, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Podcast
29 Jun 2017
Risk & Repeat: RNC voter database left open to the public
In this week's Risk & Repeat podcast, SearchSecurity editors discuss how the Republican National Committee's voter database was accidentally exposed in an Amazon S3 bucket. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
19 Jun 2017
How did thousands of MongoDB databases get hijacked?
Thousands of MongoDB configurations were hijacked due to poor authentication practices. Expert Nick Lewis explains how organizations can properly configure their implementations. Continue Reading
By -
Opinion
19 Jun 2017
How intelligence data leaks caused collateral damage for infosec
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
By- Kevin McDonald, Alvaka Networks
-
Tip
15 Jun 2017
Information privacy and security requires a balancing act
Maintaining information privacy and security seem to be separate challenges, but in reality, each is integral to the other. Expert Kevin Beaver explains how to work toward both. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
E-Zine
01 Jun 2017
Cloud access security brokers: Hard to tell what's real
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?
Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.
Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.
In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.
Continue Reading -
Answer
29 May 2017
What MongoDB security issues are still unresolved?
There are some MongoDB security issues that have yet to be resolved. Expert Matthew Pascucci discusses the risks and how to protect your enterprise from them. Continue Reading
-
News
26 May 2017
Target data breach settlement requires security improvements
News roundup: The Target settlement following the 2013 data beach requires the company to adopt a stronger security program. Plus, experts knock the FCC's DDoS claim, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Feature
24 May 2017
Trustwave Data Loss Prevention: Product overview
Expert Bill Hayes examines Trustwave Data Loss Prevention and how the product addresses data at rest, endpoint data in use and network data in transit for enterprises. Continue Reading
By -
Tip
19 May 2017
Cognitive hacking: Understanding the threat of bad data
Bad data can create more than just 'fake news.' Expert Char Sample explains how cognitive hacking and weaponized information can undermine enterprise security. Continue Reading
By- Char Sample, ICF International
-
Answer
05 May 2017
How effective is geofencing technology as a security method?
Geofencing technology is increasingly being used as a security tactic, such as to control access to servers with DNS settings. Expert Michael Cobb explains how it works. Continue Reading
By -
Tip
04 May 2017
ISAOs: The benefits of sharing security information
ISAOs are a good way for organizations to share information about security threats. Expert Steven Weil explains what these organizations are and their attributes. Continue Reading
By- Steven Weil, Point B
-
Answer
02 May 2017
How can a distributed guessing attack obtain payment card data?
Attackers can gather payment card data by carrying out distributed guessing with a minimal amount of existing information. Expert Michael Cobb explains how this attack works. Continue Reading
By -
Answer
21 Apr 2017
How does USB Killer v3 damage devices through their USB connections?
USB Killer devices, with the ability to destroy systems via a USB input, are available and inexpensive. Expert Nick Lewis explains how they work and how to defend against this threat. Continue Reading
By -
News
14 Apr 2017
DARPA's SSITH program takes aim at hardware vulnerabilities
News roundup: DARPA's SSITH program tackles hardware vulnerabilities for better security. Plus, new risks placed in OWASP Top 10, SWIFT launches new anti-fraud tool, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Podcast
05 Apr 2017
Risk & Repeat: Strong encryption under fire again
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of the encryption debate and what it means for apps that use strong encryption. Continue Reading
By- Rob Wright, Senior News Director
-
Tip
30 Mar 2017
1024-bit encryption keys: How 'trapdoored' primes have caused insecurity
Encryption algorithms using 1024-bit keys are no longer secure, due to the emergence of 'trapdoored' primes. Expert Michael Cobb explains how the encryption backdoor works. Continue Reading
By -
Tip
30 Mar 2017
DLP systems: Spotting weaknesses and improving management
DLP systems are becoming a necessity, but their weaknesses need to be tightened to ensure enterprise asset security. Expert Kevin Beaver explains what areas to focus on. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
13 Mar 2017
RSA Data Loss Prevention Suite: Product overview
Expert Bill Hayes examines the RSA Data Loss Prevention Suite, which covers data in use, in transit and at rest for corporate networks, mobile devices and cloud services. Continue Reading
By -
Answer
09 Mar 2017
CJIS Security Policy: How can companies ensure FIPS compliance?
Companies and government agencies handling criminal justice information need to comply with CJIS Security Policy. Expert Michael Cobb explains the cryptographic modules to use. Continue Reading
By -
Podcast
03 Mar 2017
Risk & Repeat: Cloudflare bug poses incident response challenges
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Cloudflare bug that leaked an undetermined amount of customer data over several months. Continue Reading
By- Rob Wright, Senior News Director
-
News
03 Mar 2017
Cloudflare security team calms fears over Cloudbleed bug
Cloudflare security researchers continue investigations as CEO calms fears over potential exposure of sensitive personal data by the Cloudbleed bug, though doubts remain. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
News
02 Mar 2017
Employees knew about Yahoo security breach years ago, per new SEC filing
A new SEC filing details who knew about the major Yahoo security breach in 2014, but experts are confused by the repercussions of the announcement. Continue Reading
By- Michael Heller, TechTarget
-
Answer
10 Feb 2017
What caused the ClixSense privacy breach that exposed user data?
A privacy breach at ClixSense led to user account details being put up for sale. Expert Michael Cobb explains how companies should be held accountable for their security practices. Continue Reading
By -
Answer
20 Jan 2017
How serious are the flaws in St. Jude Medical's IoT medical devices?
MedSec and Muddy Waters Capital revealed serious flaws in IoT medical devices manufactured by St. Jude Medical. Expert Nick Lewis explains the severity of these vulnerabilities. Continue Reading
By -
Tip
19 Jan 2017
Big data frameworks: Making their use in enterprises more secure
Many enterprises apply big data techniques to their security systems. But are these methods secure? Expert John Burke explains some of the efforts to secure big data analysis. Continue Reading
By- John Burke, Nemertes Research
-
Answer
17 Jan 2017
How does USBee turn USB storage devices into covert channels?
USB storage devices can be turned into covert channels with a software tool called USBee. Expert Nick Lewis explains how to protect your enterprise data from this attack. Continue Reading
By -
Answer
16 Jan 2017
How do man-in-the-middle attacks on PIN pads expose credit card data?
Passive man-in-the-middle attacks on PIN pads can lead to attackers stealing credit card details. Expert Nick Lewis explains how companies can mitigate these attacks. Continue Reading
By -
News
12 Jan 2017
Google Cloud KMS simplifies the key management service, but lacks features
Experts are impressed with the simplicity of Google's Cloud KMS even if it doesn't separate itself from the key management service competition. Continue Reading
By- Michael Heller, TechTarget
-
Answer
21 Dec 2016
Should one cybersecurity mistake mean the end of a CEO's career?
In one case, a tenured CEO made one cybersecurity mistake and was fired. Expert Mike O. Villegas discusses whether this sets a precedence for enterprises going forward. Continue Reading
By- Mike O. Villegas, K3DES LLC
-
Quiz
01 Dec 2016
Test your privileged user management knowledge
Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization. Continue Reading
By -
Feature
23 Nov 2016
Digital Guardian for Data Loss Prevention: Product overview
Expert Bill Hayes examines Digital Guardian for Data Loss Prevention and more of the vendor's DLP product lineup, which cover data in use, data in transit and data in the cloud. Continue Reading
By -
Feature
16 Nov 2016
CA Technologies Data Protection: DLP product overview
Expert Bill Hayes examines CA Technologies Data Protection, a data loss prevention suite designed to protect data at rest, in transit and in use across enterprise devices, networks and cloud services. Continue Reading
By -
Answer
25 Oct 2016
Can an HTML5 document with a digital signature be authenticated?
A digital signature on an HTML5 document cannot be authenticated the same way a PDF can. Expert Michael Cobb explains how enterprises should address this issue. Continue Reading
By -
Feature
11 Oct 2016
Splunk Enterprise Security: Product overview
Expert Dan Sullivan explores how Splunk Enterprise Security uses big data security analytics to incorporate multiple methods of data integration to identify malicious events. Continue Reading
By -
Feature
25 Aug 2016
Blue Coat DLP: Data loss prevention product overview
Expert Bill Hayes takes a look at Blue Coat DLP, a single appliance data loss prevention system that works with the company's web security gateway products. Continue Reading
By -
Feature
24 Aug 2016
Blue Coat Security Analytics Platform: Product overview
Expert Dan Sullivan takes a look at the Blue Coat Security Analytics Platform, which is designed to capture comprehensive network information and apply targeted security analytics. Continue Reading
By -
Feature
17 Aug 2016
WinMagic SecureDoc: Full-disk encryption product overview
Expert Karen Scarfone examines the features of WinMagic's SecureDoc, a full-disk encryption product for laptops, desktops, mobile devices and servers. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Buyer's Guide
26 May 2016
The best email encryption products: A comprehensive buyer's guide
Email encryption is a critical component of enterprise security. In this buyer's guide, expert Karen Scarfone breaks down what you need to know to find the best email encryption software for your organization. Continue Reading
-
Feature
14 Apr 2016
Voltage SecureMail encryption tool: Product overview
Expert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
12 Apr 2016
Symantec Desktop Email Encryption: Product overview
Expert contributor Karen Scarfone examines Symantec Desktop Email Encryption, a tool for encrypting email messages for individuals within the enterprise. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
17 Feb 2016
Comparing the top big data security analytics tools
Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading
By -
Answer
10 Feb 2016
What privacy regulations should enterprises follow?
The U.S. government has been criticized for its lack of updated privacy regulations. Expert Mike Chapple advises enterprises that want to bolster their privacy policies. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Feature
17 Nov 2015
Introduction to big data security analytics in the enterprise
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
By -
Tip
30 Oct 2015
Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool
Expert Michael Cobb details the changes in SHA-3, including how it differs from its predecessors and the additional security it offers, and what steps enterprises should take. Continue Reading
By -
Feature
27 Oct 2015
Vormetric Transparent Encryption: Product overview
Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading
By -
Feature
27 Oct 2015
HP Security Voltage's SecureData Enterprise: Product overview
Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading
By -
Feature
25 Oct 2015
Protegrity Database Protector: Database security tool overview
Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading
By -
Feature
25 Oct 2015
Oracle Advanced Security: Database security tool overview
Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading
By -
Feature
25 Oct 2015
McAfee Database Activity Monitoring: Database security tool overview
Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading
By -
Feature
25 Oct 2015
Imperva SecureSphere: Database security tool overview
Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading
By -
Feature
25 Oct 2015
IBM Guardium: Database security tool overview
Expert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading
By -
Tip
10 Sep 2015
Improve corporate data protection with foresight, action
Better corporate data protection demands foresight and concrete action. Learn why breach training, monitoring and early detection capabilities can minimize damage when hackers attack. Continue Reading
By- David Sherry, Brown University
-
Answer
17 Aug 2015
Can a new encryption trick prevent reverse engineering?
Expert Michael Cobb explains how reverse engineering can be made more difficult with an approach called Hardened Anti-Reverse Engineering System or HARES. Continue Reading
By -
Feature
13 Aug 2015
Comparing the top database security tools
Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing decision. Continue Reading
By -
Feature
01 Jul 2015
Tips for creating a data classification policy
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
By -
Feature
25 Jun 2015
How to keep track of sensitive data with a data flow map
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
By -
Feature
16 Jun 2015
Introduction to database security tools for the enterprise
Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading
By- Adrian Lane, Securosis
-
Feature
26 May 2015
Six criteria for procuring security analytics software
Security analytics software can be beneficial to enterprises. Expert Dan Sullivan explains how to select the right product to fit your organization's needs. Continue Reading
By -
Feature
10 Apr 2015
Symantec Endpoint Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
Sophos SafeGuard: Full disk encryption product overview
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
Microsoft BitLocker: Full disk encryption software overview
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
McAfee Complete Data Protection: Full disk encryption product overview
Expert Karen Scarfone examines the features of McAfee Complete Data Protection, a full disk encryption product for securing client-side computers and servers. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
Dell Data Protection | Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Dell Data Protection | Encryption, a full disk encryption product for securing client-side devices. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
Check Point Full Disk Encryption product overview
Expert Karen Scarfone examines the features of Check Point Full Disk Encryption, an FDE product for securing client devices such as laptops and desktops. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
Apple FileVault 2: Full disk encryption software overview
Expert Karen Scarfone examines the features of Apple's bundled full disk encryption software for Mac OS X, FileVault 2. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
10 Apr 2015
The top full disk encryption products on the market today
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
By- James Alan Miller, Senior Executive Editor
-
Feature
23 Mar 2015
Introduction to security analytics tools in the enterprise
Expert Dan Sullivan explains how security analysis and analytics tools work, and how they provide enterprises with valuable information about impending attacks or threats. Continue Reading
By -
Tip
27 Jan 2015
A CISO's introduction to enterprise data governance strategy
Every enterprise must have a viable strategy for protecting high-value data. See if your plan aligns with Francoise Gilbert's advice on top priorities to consider when defining data governance plans. Continue Reading
By- Francoise Gilbert, Greenberg Traurig
-
Feature
23 Jan 2015
The importance of email encryption software in the enterprise
Expert Karen Scarfone explains how email encryption software protects messages and attachments from malfeasance. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
05 Dec 2014
The fundamentals of FDE: Comparing the top full disk encryption products
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
25 Nov 2014
The fundamentals of FDE: Procuring full-disk encryption software
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
20 Nov 2014
The fundamentals of FDE: The business case for full disk encryption
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
12 Nov 2014
The fundamentals of FDE: Full disk encryption in the enterprise
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Tip
10 Nov 2014
Inside the four main elements of DLP tools
Security expert Rich Mogull outlines the four elements of a DLP tool: the central management server, network monitoring, storage and endpoint DLP. Continue Reading
By- Rich Mogull, Securosis
-
Feature
01 Aug 2014
The NoSQL challenge: What's in store for big data and security
Big data offers horizontal scalability, but how do you get your database security to scale along with it? Continue Reading
By- Adrian Lane, Securosis
-
News
05 Feb 2014
Amid Microsoft MD5 deprecation, experts warn against SHA-1 algorithm
With Microsoft's MD5 deprecation set for next week, experts say companies must be careful to avoid other weak protocols, like SHA-1. Continue Reading
-
Feature
26 Feb 2013
Managing big data privacy concerns: Tactics for proactive enterprises
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help companies get smarter while keeping consumers happy. Continue Reading
-
Answer
12 Feb 2013
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Continue Reading
By -
Tip
08 Jan 2013
Windows Server 2012 security: Is it time to upgrade?
Expert Michael Cobb wades through the security features of Windows Server 2012 to find out what's new and beneficial in Microsoft's latest release. Continue Reading
By -
Opinion
01 Nov 2012
Protecting Intellectual Property: Best Practices
Organizations need to implement best practices to protect their trade secrets from both internal and external threats. Continue Reading
By- Peter J. Toren
-
Tip
06 Dec 2011
P2P encryption: Pros and cons of point-to-point encryption
P2P encryption is an emerging technology; one that may be helpful for many companies, especially merchants. Mike Chapple dissects the pros and cons. Continue Reading
By- Mike Chapple, University of Notre Dame