It seems that almost every month there's another high-profile security breach in which sensitive data is leaked. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the company's involved. In this guide, learn 3 ways you can help prevent data leaks within your organization.
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines