Sensitive & secret data News

View All News

Sensitive & secret data Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Sensitive & secret data Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Sensitive & secret data

Learn to apply best practices and optimize your operations.

  • Your security appliance is essentially an IoT device

    Portnox CEO Ofer Amitai outlines five steps that can help CISOs ensure that their security appliance doesn't turn into just another IoT device. Continue Reading

  • Cloud access security brokers: Hard to tell what's real

    Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?

    Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.

    Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.

    In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.

     Continue Reading

  • Data anonymization techniques less reliable in era of big data

    Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading

View All Manage

Problem Solve Sensitive & secret data Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve