News

News

  • January 09, 2008 09 Jan'08

    Drafting data classification policies and guidelines

    Shon Harris suggests ways to draft an internal procedure on how to handle confidential data. She discusses data classification polices, steps to develop and roll out a data classification program, and what your guidelines should cover.

  • January 08, 2008 08 Jan'08

    Implementing and enforcing a corporate retention policy

    Security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise.

  • January 08, 2008 08 Jan'08

    Addressing a bussines's partners weak data security policies

    In this Q&A, security management pro Mike Rothman explains how to respond to a business partner's weak data security policies.

  • December 28, 2007 28 Dec'07

    USA Patriot Act suggestions for wireless Internet user identification

    Expert Ed Yakabovicz explains the USA Patriot Act recommendations for identifying a wireless Internet user.

  • December 28, 2007 28 Dec'07

    FFIEC impact so far

    FFIEC aims to make online banking safe for consumers by forcing financial services institutions to assess the risks in their environments and deploy appropriate controls such as strong authentication. Michael L. Jackson, associate director of the ...

  • December 28, 2007 28 Dec'07

    Data wiping -- weighing the options

    Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Q&A.

  • December 28, 2007 28 Dec'07

    Accessing confidential data once deleted for free space

    Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. Michael Cobb explains whether the files live and how they can be accessed.

  • December 28, 2007 28 Dec'07

    Guidelines for DoD-level secure erasure

    Platform security expert Michael Cobb explains whether DOD-level secure erasure is a doable (and necessary) procedure.

  • December 28, 2007 28 Dec'07

    Retention policy implementation best practices

    Security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise.

  • December 28, 2007 28 Dec'07

    Keeping compliance terms straight

    Keeping the definitions of audit, vulnerability assessment and pen testing straight can be confusing. Expert Kevin Beaver helps sort them out.

  • March 14, 2006 14 Mar'06

    Security Bytes: Authorities lasso alleged debit fraud ring

    Meanwhile: Apple makes a new fix; a Trojan locks down files, demands ransom; a faulty McAfee AV finds too many viruses; Liberty Alliance deployments expand.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close