InformationWeek encourages readers to engage in spirited, healthy debate,
including taking us to task. However, InformationWeek moderates all comments posted to our site,
and reserves the right to modify or remove any content that it determines to be derogatory, offensive,
inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM.
InformationWeek further reserves the right to disable the profile of any commenter participating in
Don't let anyone tell you that implementing a DLP system is easy. It takes time, patience and diplomacy to ensure that technical requirements, security policy and business needs are balanced. In this Dark Reading report, we recommend the 10 steps that must be taken to keep company data safe - and business managers and users happy and productive.
The complexity of managing mobile devices should get easier going forward, but that's not the case right now. As traditional laptop PCs continue to die a slow death, most IT departments will be forced to alter the way they approach client management. Despite the growing popularity and acceptance of the
bring-your-own-device - or BYOD - movement, there are a number of things working against IT. Fortunately, there are also a number of tools, some of them free, that security professionals can use along with strong policy and best practices to close the enterprise mobile security gap.
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage - especially when it comes to intellectual property theft. In this retrospective of recent Dark Reading coverage, we look at the hot trends and tips on how to flip the equation on the insider threat.
Other reports from the Insider Threat Tech Center:>