Data security management News
May 20, 2014
Security budgets in Australia are soaring as hacking incidents reach new levels.
August 02, 2013
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.
July 24, 2013
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.
December 17, 2012
Adopting cloud-based services raises concerns and questions about data security, according to the Sophos 2013 Threat Report.
Evaluate Data security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP. Continue Reading
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Disaster recovery planning is something that seems challenging for all businesses. Virtualization in addition to its operational flexibility,...Continue Reading
Set up is very easy. Pick your proxy server, set up the repositories and off you go. The backup compressions needs work.Powered by IT Central Station
Valuable Features: Replication WAN Accelerator Backup Ease of use File Level restoration • Improvements to My Organization: Restores...Continue Reading
You avoid costly and time consuming DR recovery tests but vSphere needs additional scalability for smaller sitesPowered by IT Central Station
Valuable Features: Key feature for me is the ability to test recovery plans with zero impact to the production running environment, this is key...Continue Reading
Manage Data security management
Learn to apply best practices and optimize your operations.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe? Continue Reading
Expert Nick Lewis covers the benefits of threat intelligence for enterprises, plus how to integrate intel feeds with existing security programs. Continue Reading
Problem Solve Data security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Ed Moyle analyzes five key cloud computing security concerns vexing enterprises and the emerging products that are attempting to address them. Continue Reading
At times, security incident response procedures require drastic measures. Expert Nick Lewis explains when and how to perform a system shutdown. Continue Reading
Drawing from recent CSA guidance, expert Dave Shackleford lists key questions to ask cloud providers to determine their cloud forensics capabilities. Continue Reading