A data classification policy template gives you a repeatable way to define how your organization labels and protects data, so ...
A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
Database security has become one of the most pressing challenges for businesses today. The complexity of keeping data private and secure grows daily. The data in these databases often contain personal ...
Database security, like all other areas of strong security, must be based upon a multitude of policies, processes, and controls. DAM is one layer of defense-in-depth, but database security should also ...
The FBI is in the midst of a major rewrite of the security policy that sets minimum criteria for how its criminal justice information is protected. With the revamp, the bureau is aiming to make sure ...
With the proliferation of mobile apps, their security becomes critical: apps store and transmit a lot of sensitive user data. This data can be vulnerable due to weak encryption, insecure storage, and ...
Archimedes famously said the quickest route between two points is a straight line. He meant geometry, though I argue this concept applies seamlessly to data security. To secure data in enterprise ...
Back in 2006, British mathematician Clive Humby stated that data was the new oil. Like oil, data isn’t useful in its raw state and must be refined, processed, and distributed to deliver value. Nearly ...