Data security & protection News
September 01, 2015
Why no one should have been surprised by the government data hack.
August 18, 2015
In this podcast, SearchHealthIT's HIT Squad discussed Cerner's DoD EHR contract and whether mHealth delivers ROI and health IT security.
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
July 28, 2015
Savage IO's SavageStor is a software-agnostic brick of storage, servers and controllers that leaves storage management and data protection to open software.
Data security & protection Get Started
Bring yourself up to speed with our introductory content
To ensure the future of information security, enterprises must learn from the past, launch proper training and install the right technologies. Continue Reading
The COBIT 5 framework helps IT organizations bring online new enterprise platforms like mobility without compromising data security and control. Continue Reading
A recent study revealed more than 95% of SAP systems were exposed to potentially disastrous vulnerabilities. Expert Nick Lewis explains how to mitigate these SAP vulnerabilities and maintain ERP security. Continue Reading
Evaluate Data security & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
David Strom outlines six information security strategies that CIOs have adopted as their organizations migrate toward hybrid clouds. Continue Reading
Using a managed security service provider can be an appealing option to enterprises, but there are many factors to consider before making the move to outsourcing. Continue Reading
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.
This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.
This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading
Manage Data security & protection
Learn to apply best practices and optimize your operations.
IT friction between your security and network operations personnel sap productivity. Maybe it's time for everyone to work together. Continue Reading
Social engineering scams are abundant, proper preparation and training is key to avoiding the danger. Expert David Sherry discusses social engineering basics and explains how to keep employees out of harm's way. Continue Reading
In the digital age, companies are generating, storing and maintaining a sometimes overwhelming amount of "big data." The trend has forced companies to alter -- and sometimes completely revamp -- information governance strategy. The constant threat of data breaches further complicates governance processes, while compliance rules require innovative methods to track and analyze information. All is not lost, however: With the right big data governance strategy, companies can make sure their information stays secure and compliant, while still taking advantage of the digital assets at their disposal. In this handbook, we’ll discuss the governance complications created by big data and employee mobility, and the latest information management strategies that help organizations adapt to increased storage needs, regulatory compliance mandates and security vulnerabilities unique to the digital age. Continue Reading
Problem Solve Data security & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Information security metrics may be lost on some executives, Curran says. Keep their attention on security measures with the right portfolio. Continue Reading
Employees love the ease of downloading apps. But IT needs to be vigilant in providing workers with what they want while maintaining security over SaaS products. Continue Reading
News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices. Continue Reading