Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
__NOTOC__
+
<!--|body|-->__NOTOC__
Line 14: Line 14:
[[Image:Data_Encryption.jpg|250px]]
[[Image:Data_Encryption.jpg|250px]]
-
===[[Data encryption strategies|Data Encryption Strategies]]===
+
==[[Data encryption strategies|Data Encryption Strategies]]==
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
[[Data encryption strategies|read more...]]
[[Data encryption strategies|read more...]]
Line 27: Line 27:
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.   
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.   
</p>
</p>
-
[[Implementing storage network security | read more...]][[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: Wikitips]]
+
[[Implementing storage network security | read more...]]<!--|body|-->
 +
 
 +
'''Action Item: <!--|actionitem|--><!--|actionitem|-->
 +
 
 +
''Footnotes: <!--|footnotes|--><!--|footnotes|-->
 +
 
 +
[[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage asset management]][[Category: Storage professional alerts]][[Category: Storage security]][[Category: Wikitips]]

Revision as of 04:00, 30 September 2009


Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.

Wikitip

Move security investments to the data

Storage vendors will increasingly attempt to lead in the data security business as a natural extension of existing franchises. Users should evaluate solutions not only on their ability to protect the castle's perimeter (with moats and walls) but also on other techniques to protect the king when he's beyond the safety of the castle.

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Information Security Professional Alerts


Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

Personal tools