Posts tagged with ‘data security’

  • Endpoint Devices & the Battle for Data Security

    As printed in Healthcare Global magazine The daily process of treating patients has been compared more than once to a...

    By in Industry Insights13-06-2013
  • With SHODAN at the Door, is it Still Possible to Lock Down Data?

    As posted on Wired.com The real-world SHODAN isn’t as malevolent as its fictional namesake. But in the wrong hands,...

    By in Industry Insights30-05-2013
  • BYOD security

    The Missing Link in BYOD Security

    In all the noise leading up to the release of Windows 8, one of the loudest conversations was about...

    By in Industry Insights05-03-2013
  • BYOD & Security: It’s Not the Device, But the Data

    Overall MDM is great for over-the-air app, data and config distribution. However the big question enterprises have to answer...

    By in Industry Insights02-02-2013
  • Security Breaches Are On The Rise, But Preventable

    Recent research validates what most security professionals already know – security breaches are on the rise. However, what may...

    By in Product Deep-Dives15-08-2012
  • Hardening the Cloud: Learnings from recent security breaches

    When I was at Veritas, we did a security audit of a newly-built data center product. A bunch of...

    By in Industry Insights03-08-2012
  • Encryption, Deduplication and Making Sense

    Recently, I was in a meeting with the CIO of a leading bay area company, when he interrupted my...

    By in Product Deep-Dives10-03-2012
  • Enterprise Cloud Security: inSync Cloud Deployment Learnings

    At Druva, we’re currently going through an ISAE 3402 Type-I/II audit. It caused me to step back to understand...

    By in Druva News21-02-2012
  • Six Key Enterprise Cloud Trends for 2012

    1. Cloud Security There was a steep rise in the number of security breaches in 2011. Part of it...

    By in Druva News09-02-2012