Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 15: Line 15:
====[[Data encryption strategies]]====
====[[Data encryption strategies]]====
-
<p style="color: #666;">...Glenn Street, senior database specialist with Copyright Clearance Center, shares with us some insights about being, or becoming, a database administrator (DBA): Q: What’s the nutshell description of a DBA? </p>
+
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
-
[[Question and answer about DBAs|read more...]]
+
[[Data encryption strategies|read more...]]
| valign="top" |
| valign="top" |
{{Information Security Professional Alerts}}
{{Information Security Professional Alerts}}
Line 26: Line 26:
|}
|}
-
[[Category:Careers]][[Category: Careers wikitips]][[Category: Information Management wikitips]][[Category: Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: TreeTop Technologies]][[Category: Wikitips]]
+
[[Category:Careers]][[Category: Careers wikitips]][[Category: Enterprise mobile wikitips]][[Category: Information Management wikitips]][[Category: Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: TreeTop Technologies]][[Category: Wikitips]]

Revision as of 03:38, 30 September 2009


Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.

Wikitip

Organize storage security top down and bottom up

Organizations need to adopt a top-down, bottoms-up approach to organizing storage security. A top-down (Chief Information Security Officer) CISO needs to define the levels of risk and spend, as well as define a layered storage security architecture. Each storage security technology layer needs to be assigned to an appropriate IT department for implementation and ongoing operations.

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data encryption strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Information Security Professional Alerts


Featured Success Story

Personal tools