Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Submission Summary: 0 pending, 2 declined, 1 accepted (3 total, 33.33% accepted)

Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Dealing With Sensitive Data

imus writes: Just wondering how most IT shops secure sensitive data (customer records). Most centrally managed databases seem to be monitored and maintained very well and IT workers know when they are tampered with or when unauthorized access occurs. But what about employees who do legitimate selects from these databases and then load CSV files and other text files onto their laptops and PDAs? How are companies dealing with situations where the database is relatively secure, but end-use devices contain bits and pieces of sensitive business data, and sometimes whole segments? Does anyone use sensitive data discovery software such as Find_SSNs or Senf or other tools? Once found, how do you deal with it? Do you force encryption, delete it or prevent extracts?

Submission + - Is a zeroed hard drive really secure?

imus writes: A challenge to confirm whether or not a professional data recovery firm or any individual(s) or organization(s) can recover data from a hard drive that has been overwritten with zeros once. We used the 32 year-old Unix dd command using /dev/zero as input to overwrite the drive... What do you guys think, can the challenge be won?

Slashdot Top Deals

I attribute my success to intelligence, guts, determination, honesty, ambition, and having enough money to buy people with those qualities.