Enterprise information security management

Email Alerts

Register now to receive SearchCIO.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Firm touts easier, more secure access to IP data

    A data loss prevention vendor turns the table on protecting sensitive data with a feature that automatically finds sensitive data and determines who should be allowed to access it. 

  • Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the... 

  • Electronic medical records at risk of being hacked, report warns

    A 15-month study by health experts and vendors tests electronic health record systems -- and the grade is not good. 

  • Fewer security breaches blamed on human error

    Human error is still the main reason for security breaches, but a little learning, it turns out, isn't a dangerous thing after all. 

  • Second Life a security risk for businesses, Gartner cautions

    Companies risk damage to their brand and reputation, as well as potentially serious security breaches by engaging in activities in unmoderated virtual worlds such as Second Life, according to Gartner Inc. 

  • Blog: Data loss rarely leads to ID theft, or does it?

    A new report suggests that lost or stolen data is rarely used to commit identity theft. Oh yeah? Then what are they using it for? Blogger Jeff Kelly takes a closer look at the findings. 

  • CIOs overconfident about protecting intellectual property

    New research suggests most IT organizations think they're doing a good job protecting intellectual property. But their answers to questions about how they protect this information say otherwise. 

  • Managing mobile computing policies

    Many organizations rely heavily on mobile workers, such as sales and technical support staff members who bring in revenue and keep customers satisfied. According to industry experts, the first step in mobile computing success is to create and maintai... 

  • Homeland Security IT chief blamed for cyberwoes

    In response to reports of persistent cybersecurity flaws at the Department of Homeland Security, a top congressional Democrat on Wednesday questioned whether the agency's CIO deserves to keep his job. 

  • Retailers face deadline for security standard

    Credit card firms are giving merchants until June 30 to comply with the Payment Card Industry Data Security Standard, which is designed to protect users from online theft. Teranet discusses what it had to do.