Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media...
List of Disk wipe software
People and organizations dispose of their computers including the Hard drives when no more needed or considering that...
Global Payments breach.initial review
Security breaches are become a common thing these days. They hit the front page only when the size or importance of...
Outsourcing Information Security
Many a times when considering cost reduction, Information security outsourcing often come up for discussions. Can we...
Advanced Persistent Threat (APT)
Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of...
Data Loss Prevention best practices
Data Loss Vectors Insider threat being one among the top ten threats an organization faces, data loss prevention...
Data Loss Prevention Solutions worth evaluating
12Content Aware DLP Solutions worth evaluating Data loss prevention is being considered as one among the key...
Data loss prevention
Businesses are driven by data. Global organizations need more than network security to protect their...
Cloud computing and Data security
Cloud computing is becoming a real trend in today.s business world. Businesses are increasingly opting for cloud based...
Stratfor Incident.An analysis
Stratfor, a global security think-tank, is hacked and now everyone knows about it. Based on the information available...
Importance of Database Activity Monitoring
Database Activity Monitoring is a key process in the data protection suite of activities. Databases being the key...
Database Activity Monitoring
Who has unlimited access to your data? None other than the database administrators. We do trust them, don.t we? Yep,...
Sega says hackers stole data of 1.29 million users
Sega has confirmed that the personal data of 1.29 million of its customers was stolen in an attack on its systems. It...
Top security predictions 2011-2012
Security predictions are part of the year end routines of many security solutions and services companies as well as...
CIOs more concerned than ever about social media and data loss
Survey finds security breaches due to social networking more pressing than everA new survey from email security firm...
Typical data leakage scenario.s
Data leakage is a key threat which could give sleepless nights for any business executive and is definitely on the top...
Preventing Theft In The Corporate World
Anyone who steals the identity of a user becomes that user and has access to their most sensitive systems and data. If...
Ask the right question to secure your critical data
Information is vital for any organization in this world. Information is not only power, but also Money. In today.s...