Data governance strategy

  • July 13, 2006 13 Jul'06

    Security checks and balances critical for financial services provider

    Financial firms face danger from every corner of cyberspace. Clarke American CISO explains how he's using a combination of defenses and strategies to keep threats at bay.

  • June 21, 2006 21 Jun'06

    Playing the blame-game with regulatory compliance issues

    Security pros and auditors are often at odds due to miscommunications, but an analyst at this year's Burton Group Catalyst Conference said it doesn't have to be that way.

  • June 20, 2006 20 Jun'06

    Options for recovering data with Data Protection Manager

    Having backups of your data won't do you any good unless you know how to restore them. Here are some options for restoring data through Microsoft's Data Protection Manager.

  • June 08, 2006 08 Jun'06

    Veterans Affairs theft compromised personal data of active-duty soldiers

    Data belonging to as many as 2.2 million active-duty troops was stolen along with information involving 26.5 million veterans, said the U.S. Department of Veterans Affairs.

  • June 08, 2006 08 Jun'06

    Recent data thefts put 300,000 at risk

    Recent data thefts include three stolen laptops, which jeopardize the personal information of former supermarket employees, customers of and members of the YMCA.

  • June 01, 2006 01 Jun'06

    Data theft at Veteran's Affairs should be wake up call

    A recent VA data theft should be a call to arms, security experts say. Will this most recent data theft incident be a wake up call to Congress and corporate boardrooms?

  • May 23, 2006 23 May'06

    Disaster recovery success begins and ends with the basics

    This list of disaster recovery basics can help security practitioners improve their disaster recovery plans.

  • May 18, 2006 18 May'06

    Securing your Office

    Microsoft Office vulnerabilities are not uncommon and most of your company's sensitive data is stored in an Office document. Contributor Tony Bradley recommends these best practices to make sure your Office is secure.

  • May 03, 2006 03 May'06

    Protecting encrypted data from attacks

    You may think of encryption as a way to secure your client data. Hackers, however, see encryption as the express carpool lane, allowing them to bypass your entire security infrastructure and get to your applications. In this tip Amir Peles explains ...

  • April 19, 2006 19 Apr'06

    Moving customer data quality upstream

    Companies should move data quality controls "upstream" to save money, retain customers, and mitigate clean-up efforts, one expert says.

  • April 09, 2006 09 Apr'06

    Special report: Data quality

    This special report helps you better manage and leverage your company's data.

  • March 29, 2006 29 Mar'06

    Fidelity laptop snafu spotlights need for security policies

    The theft last week of a Fidelity-owned laptop containing sensitive data could have easily been prevented. Are your users paying attention when it comes to laptop security?

  • March 14, 2006 14 Mar'06

    How Chief Medical Officers Use Business Intelligence

    Business intelligence provides improved information to support the evolving role and responsibilities of today's chief medical officer.

  • March 14, 2006 14 Mar'06

    Master data management: How to get started

    A master data management (MDM) expert explains how to get started on an MDM initiative -- from data governance to building a business case.

  • January 17, 2006 17 Jan'06

    Data leaks and losses abound

    Whether it was a government Web site exposing sensitive data or a bank losing a tape with 90,000 customers' Social Security numbers, this week there were plenty of data security snafus.