This month, SearchDataManagement.com looks at the omnipresent issue of security. Join us as we examine everything from security policy best practices to the malevolent effects of data theft and beyond. Read for all the latest news designed to help you implement the optimum data security policy.
theft at Veteran's Affairs should be wake up call
A recent VA data theft should be a call to arms, security experts say. Will this most recent data theft incident be a wake up call to Congress and corporate boardrooms?
leaks and losses abound
A government Web site exposes sensitive data while a bank loses a tape with 90,000 customers' Social Security numbers.
breach spotlights internal data security
Experts say Marriott's recent data loss shows that internal data security controls may be lagging at many companies, and offer tips on how users can protect themselves better.
I want(ed) for Christmas are some laws with teeth
From a state breach-notification law spreading nationwide to a spam king that legal eagles finally nailed, 2005 marked a turning point in data security. But here's how to do more.
turns investigative tools on itself
The forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security.
and found: DHL returns missing data tape
Two million ABN AMRO Mortgage customers breathe a sigh of relief after a backup tape had been reported missing. Still, customers are urged to check their credit activity.
experts vexed over bank's missing data mishap
In the aftermath of a rash of personal information leaks over the past weeks, privacy advocates ask why some backup data isn't being encrypted.
upgrading? Keep SQL Server 2000 secure
Not planning to upgrade to SQL Server 2005 for at least another six months? Kevin Beaver outlines 10 ways to keep SQL Server 2000 locked down.
Katrina sparks data privacy concerns
Microsoft posted private citizens' data online to help reunite families in the aftermath of hurricane Katrina, raising concerns over privacy in these extraordinary circumstances.
|Security and privacy policies|
MS Office is the most widely used application suite in the world. It presents a definite security concern on the desktop. Make sure your clients are secure.
CD/CD-R technology offers on-the-fly encryption
A new method for encrypting data to removable storage holds promise, but has a few downsides.
encrypted data from attacks
Encryption should not provide hackers with an express lane to your applications and data. Fortunately, there are things you can do to shut down that fast lane.
beefs up database security at Collaborate '06
Oracle's new Database Vault and Secure Backup offerings promise to make it easier to avoid internal threats and automate and encrypt disk-to-tape backups.
laptop snafu spotlights need for security policies
The theft last week of a Fidelity-owned laptop containing sensitive data could have easily been prevented. Are your users paying attention when it comes to laptop security?
mainframe encryption: The gold standard for security does an upgrade
While the mainframe is the gold-standard of security, it's not hack proof—and IBM is smart enough to know it.
storage security policies
Learn about essential policy creation processes, along with specific policies you'll likely need in order to ensure storage security is not kept out of the loop.
Lengthy logs not always a good thing
Regulatory compliance experts often stress the importance of detailed log keeping. But one legal expert warns too much detail can be used to stifle free speech.
in the database: The last line of defense
This excerpt from the new book by Kevin Keenan introduces the three types of data cryptography.
on failed disks worries users
Increased regulation and security scrutiny has users struggling with new problems, such as data on failed disks sent off site for repair.
security 101 -- A checklist of practical safeguards
There are some commonly overlooked storage security issues that every storage administrator needs to consider.
BPO providers tighten data security
Indian BPO providers working to protect their reputations and customer data have issued workplace security rules tighter than most in the U.S.
Download: Defeating the Hacker: A non-technical guide to computer security
Read this excerpt from Defeating the Hacker: A non-technical guide to computer security and heed the warning from the author, an admitted ex-hacker, "Information security is a fast-moving field, and the hackers' desire to find new methods of attack never wanes. Whatever you put in their way, they will use to their advantage."
Infrastructure Protection in Homeland Security: Defending a Networked Nation
In this excerpt from Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, Ted G. Lewis outlines a scientific approach to the process of infrastructure protection. Utilizing network theory, optimization theory and simulation software, Lewis addresses the key question in network security: What should be protected and how?