Data security & protection News
November 06, 2015
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
November 05, 2015
Making a backup purchase? You probably want to solve specific problems and build out your infrastructure, but cost, capacity and scaling matter.
October 29, 2015
Both cloud providers and their users are responsible for data security in the cloud. Unfortunately, it's not always easy determining who's accountable for what.
September 01, 2015
Why no one should have been surprised by the government data hack.
Data security & protection Get Started
Bring yourself up to speed with our introductory content
Healthcare cloud services come in various forms, including analytics models and system backups. Those are two of the reasons cloud has the attention of health IT professionals. Continue Reading
Security reports are a good way for CISOs to communicate with the board of directors. Here are specific topics that should be included in the reporting. Continue Reading
The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001. Continue Reading
Evaluate Data security & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan explores the emerging category of big data security analytics and outlines the vital capabilities and key benefits of the technology for enterprises. Continue Reading
While Docker data container protection methods haven't reached the level found with hypervisor-based virtual machines, these four technologies can help users with the challenge. Continue Reading
These unexpected charges and fees can balloon colocation costs for enterprise IT organizations. Continue Reading
Manage Data security & protection
Learn to apply best practices and optimize your operations.
Never-ending network challenges mean IT and business leaders need to adopt a unified information security policy management platform. Continue Reading
Harvey Koeppel recounts his quest to deliver great user experience without inviting undue data risks. The journey was not easy. Continue Reading
As threats to cloud data security continue to evolve, businesses must stay on their toes and incorporate front- and back-end processes to make sure their information is protected. Continue Reading
Problem Solve Data security & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Building an Information Security Awareness Program, authors Bill Gardner and Valerie Thomas discuss why lecturing is an ineffective method of security awareness programs and offer alternative measures enterprises should consider. Continue Reading
As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.
Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off. Continue Reading
Information security metrics may be lost on some executives, Curran says. Keep their attention on security measures with the right portfolio. Continue Reading