Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets
How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.
Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.
Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions
New technology lets you hide and verify network identity inside the packets themselves.
Using pattern matching with information taxonomy tools to track sensitive information leaving the company
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Encrypting, monitoring, and auditing access to actual data
Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.