Security: Data Protection


Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Cloaking Assets With Identity-Level Firewalls

New technology lets you hide and verify network identity inside the packets themselves.

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Case Study: Protecting Intellectual Property on the Go

Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.

Briefs

E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.