RSS feed Get our RSS feed

News by Topic

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply


Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.

Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
 Email this page
Published:  Aug 18, 2008
Length:  15
Type:  White Paper