Best practices for implementing a data disposal policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael Cobb clears up some of the confusion and reveals which best practices can boost an enterprise's data destruction policy.
Banking on policy in next-generation firewall
When Nicolet National Bank was ready for a new firewall, they found an application-centric tool from Palo Alto Networks changed they way they thought about firewalls. Find out why.
How to 'discover' M&A security posture
If done improperly, an M&A can leave your financial company exposed. This tip offers a methodology for the acquiring company to ensure that doesn't happen.
Data leak prevention: Controlling financial services threats
Data leaks are a growing threat at financial services organizations. Learning where to find the leaks, implementing the right tools and controlling the insider threat are steps information security pros can take to keep their company data secure.
This was first published in December 2008