Security: Data Protection


Making the Grade: 6 Data Protection Best Practices for Universities and Colleges

We explore the best practices that address the special needs of educational institutions.

IT Security: 2012 in Review, Predictions for 2013

The top trends security administrators dealt with in 2012 and what's ahead in 2013.

Q&A: Making File Transfers and Sharing More Secure

Is FTP losing out to file-sharing cloud services?

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.

Q&A: Securing Data in the Cloud

Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.

A CxO’s Guide to Understanding Today’s Most Dangerous Attacks

To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

Q&A: Why Big Data Security in the Cloud is No Small Matter

Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?

New Regulations Bring Advancements in Data Governance

As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.

Q&A: IT Risk and Security Management

A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?

Batten Down the Hatches on IBM i

Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Eye on Security: More Devices, More Data Points, Fewer Security Holes: Advanced Security Integration

Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.