Data governance strategy
- November 16, 2006
The average cost of managing the aftermath of a data security breach is on the rise, but it's giving CIOs the data they need to justify new security investments.
- October 05, 2006
Malicious insiders remain a menace to data security, but it's the loyal employee who takes a lax approach to policy that could be your most looming threat.
- September 27, 2006
A recent study finds marketers are aware that data breaches can harm their brand, but few have a plan of action in place. Companies need to be direct in dealing with the problem.
- July 18, 2006
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning.
- July 13, 2006
Financial firms face danger from every corner of cyberspace. Clarke American CISO explains how he's using a combination of defenses and strategies to keep threats at bay.
- June 21, 2006
Security pros and auditors are often at odds due to miscommunications, but an analyst at this year's Burton Group Catalyst Conference said it doesn't have to be that way.
- June 20, 2006
Having backups of your data won't do you any good unless you know how to restore them. Here are some options for restoring data through Microsoft's Data Protection Manager.
- June 08, 2006
Data belonging to as many as 2.2 million active-duty troops was stolen along with information involving 26.5 million veterans, said the U.S. Department of Veterans Affairs.
- June 08, 2006
Recent data thefts include three stolen laptops, which jeopardize the personal information of former supermarket employees, customers of Hotels.com and members of the YMCA.
- June 01, 2006
A recent VA data theft should be a call to arms, security experts say. Will this most recent data theft incident be a wake up call to Congress and corporate boardrooms?
- May 23, 2006
This list of disaster recovery basics can help security practitioners improve their disaster recovery plans.
- May 18, 2006
Microsoft Office vulnerabilities are not uncommon and most of your company's sensitive data is stored in an Office document. Contributor Tony Bradley recommends these best practices to make sure your Office is secure.
- May 03, 2006
You may think of encryption as a way to secure your client data. Hackers, however, see encryption as the express carpool lane, allowing them to bypass your entire security infrastructure and get to your applications. In this tip Amir Peles explains ...
- April 19, 2006
Companies should move data quality controls "upstream" to save money, retain customers, and mitigate clean-up efforts, one expert says.
- April 09, 2006
This SearchDataManagement.com special report helps you better manage and leverage your company's data.