Security: Data Protection

Used Laptops Offer Secrets for Sale—Cheap

Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets

Protecting Customer Data at the Browser Level

Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.

Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Cloaking Assets With Identity-Level Firewalls

New technology lets you hide and verify network identity inside the packets themselves.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Case Study: Protecting Intellectual Property on the Go

Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.


E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.