• January 09, 2008 09 Jan'08

    Drafting data classification policies and guidelines

    Shon Harris suggests ways to draft an internal procedure on how to handle confidential data. She discusses data classification polices, steps to develop and roll out a data classification program, and what your guidelines should cover.

  • January 08, 2008 08 Jan'08

    Implementing and enforcing a corporate retention policy

    Security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise.

  • January 08, 2008 08 Jan'08

    Addressing a bussines's partners weak data security policies

    In this Q&A, security management pro Mike Rothman explains how to respond to a business partner's weak data security policies.

  • December 28, 2007 28 Dec'07

    USA Patriot Act suggestions for wireless Internet user identification

    Expert Ed Yakabovicz explains the USA Patriot Act recommendations for identifying a wireless Internet user.

  • December 28, 2007 28 Dec'07

    FFIEC impact so far

    FFIEC aims to make online banking safe for consumers by forcing financial services institutions to assess the risks in their environments and deploy appropriate controls such as strong authentication. Michael L. Jackson, associate director of the ...

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • December 28, 2007 28 Dec'07

    Data wiping -- weighing the options

    Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Q&A.

  • December 28, 2007 28 Dec'07

    Accessing confidential data once deleted for free space

    Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. Michael Cobb explains whether the files live and how they can be accessed.

  • December 28, 2007 28 Dec'07

    Guidelines for DoD-level secure erasure

    Platform security expert Michael Cobb explains whether DOD-level secure erasure is a doable (and necessary) procedure.

  • December 28, 2007 28 Dec'07

    Retention policy implementation best practices

    Security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise.

  • December 28, 2007 28 Dec'07

    Keeping compliance terms straight

    Keeping the definitions of audit, vulnerability assessment and pen testing straight can be confusing. Expert Kevin Beaver helps sort them out.

  • March 14, 2006 14 Mar'06

    Security Bytes: Authorities lasso alleged debit fraud ring

    Meanwhile: Apple makes a new fix; a Trojan locks down files, demands ransom; a faulty McAfee AV finds too many viruses; Liberty Alliance deployments expand.