<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / risk</title>
<link>http://netvouz.com/lillymark/tag/risk?feed=rss&amp;pg=6</link>
<description>lillymark&#39;s bookmarks tagged &quot;risk&quot; on Netvouz</description>
<item><title>Data Centric World: A Common Sense Guide to Data Management</title>
<link>http://blog.aujasnetworks.com/data-centric-world-common-sense-guide-data-management.html</link>
<description>In my earlier blog, I gave a brief history of data protection and discussed how organizations are beginning to cope with it. In this blog we will look at the central issues involved in data governance in general and how they impact organizations in particular.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 01 Aug 2012 11:44:09 GMT</pubDate>
</item><item><title>Data Centric World: Zen and the Art of Data Protection</title>
<link>http://blog.aujasnetworks.com/data-centric-world-zen-art-data-protection.html</link>
<description>The phrase data protection conjures up all kinds of TLAs like DLP (Data Leakage Prevention) or DRM/IRM (Digital/Information Rights Management) or the newest DAM (Database Access Monitoring). What will annoy the reader more is that I am referring to all the above three letter acronyms and much more.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 06 Sep 2012 10:28:19 GMT</pubDate>
</item><item><title>Data Loss Prevention – A Technology or System?</title>
<link>http://blog.aujas.com/data-loss-prevention-technology-system.html</link>
<description>The need for data protection has seen a surge in the recent past and organizations are finding themselves subject to an increasing number of data protection requirements that obligate them to protect employee, consumer and customer personal data against threats and hazards from within and outside of their organizations.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Sep 2013 03:57:07 GMT</pubDate>
</item><item><title>Data protection policies and practices</title>
<link>http://goarticles.com/article/Avoid-Data-Loss-With-a-Comprehensive-Data-Protection-Framework/7923177/</link>
<description>The increase of data, remote access and the prevalence of insider and outsider crimes, create many a vulnerabilities in the enterprise.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 18 Oct 2013 10:33:21 GMT</pubDate>
</item><item><title>Data protection service management</title>
<link>http://www.articlesbase.com/software-articles/importance-of-implementing-an-identity-and-access-management-software-6749742.html</link>
<description>The IT networks are witnessing increasing threats from outside and inside an enterprise. The conventional perimeter defenses can often overlook insider identity threats, such as password disclosures and fraudulent practices owing to staff collusion.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 11 Sep 2013 02:57:35 GMT</pubDate>
</item><item><title>Data Protection Services and Solutions</title>
<link>http://www.amazines.com/article_detail_new.cfm/6038661?articleid=6038661</link>
<description>Although enterprises face a continuous challenge in protecting sensitive information, the advent of new technologies like social media, mobile and cloud technologies, has made it simpler for data leakage.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 07 Oct 2013 11:53:26 GMT</pubDate>
</item><item><title>Data Protection Solutions – Secure Your Information Lifecycle</title>
<link>http://www.slideshare.net/AujasNetworks/data-protection-solutions-secure-your-information-lifecycle</link>
<description>The increasing demands of big data, mobility and cloud services have heightened the security risks in the corporate networks. As a result, the importance of data protection is on the rise.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 05 Jun 2013 09:50:46 GMT</pubDate>
</item><item><title>Data Protection Solutions for Effective Risk Management</title>
<link>http://www.articlesnatch.com/Article/Data-Protection-Solutions-for-Effective-Risk-Management/4753160</link>
<description>The business environment today challenges  enterprises not only to bring in  innovation in its  products and services,   but also demands for  ways and means to protect its IT infrastructure, data and other  critical assets.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 23 May 2013 09:23:33 GMT</pubDate>
</item><item><title>Data Protection Solutions- A Holistic Approach</title>
<link>http://www.articlesbase.com/technology-articles/data-protection-solutions-a-holistic-approach-6555911.html</link>
<description>The Ponemon Institute through their researches in 2010 on cost of data breach across the developed nations, have showcased that nearly 60-70% of the breaches are a result of malicious attacks and negligence.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 19 Apr 2013 06:13:33 GMT</pubDate>
</item><item><title>Data Security: How Do Data Protection Solutions Work?</title>
<link>http://goarticles.com/article/Data-Security-How-Do-Data-Protection-Solutions-Work/7373569/</link>
<description>The significance of data for an enterprise and its security has resulted in the formulation of numerous regulations and policies concerning data protection. One that deserves mention in this context is the Data Protection Act of 1998 that got enforced on March 1st 2000.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 07 Feb 2013 06:06:04 GMT</pubDate>
</item></channel></rss>