RSS feed Get our RSS feed

News by Topic

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Utimaco

Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.

Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
 Email this page
Published:  Aug 18, 2008
Length:  15
Type:  White Paper