Posts tagged with ‘security’

  • 20 Questions InfoSec Will Ask About Your Awesome Cloud Project

    With technology budgets increasingly managed outside of IT, it’s not unusual for enterprise business units to champion new cloud...

  • How to Undo the Voodoo of A Ransomware Attack

    Ransomware attacks are in the rise, impacting not just Windows systems but Android and Macs as well. These…
  • 3 Steps to Manage, Protect and Secure Decentralized Data

    To say that we live in a data-rich world is an understatement. Every day, we create and store 2.5 quintillion...

  • 4 Lessons from Recent Data Breaches

    Security in the Digital Age: 4 Lessons from Recent Data Breaches

    Recent data breaches, including 2015’s infamous Ashley Madison hack, have shown the world two valuable lessons: in the age...

    By in Product Deep-Dives25-02-2016
  • How IT and InfoSec Can Address Legal Hold Challenges On Mobile

    IT teams have often been clueless about how to facilitate eDiscovery requests on their organization’s’ mobile devices. This demand...

  • At Opposite Ends of the Internet Consolidation Tightrope: Accountability, Security, Privacy, and the Future of the Internet

    The Internet, like other computing resources, operates on a pendulum swing: from centralized to decentralized, from rampant innovation to...

  • Training Users to Get Clueful about IT Security

    Everyone in IT wants employees to be educated about security —  if for no other reason than it’s a...

  • 5 Black Hat Presentations I Don’t Want to Miss (and Neither Do You)

    In my 30+ years in the computer industry, I’ve attended hundreds of tech conferences. Somehow, though, I’ve never made...

  • A Data Breach Is Inevitable: 6 Ways to Protect the Organization Before It Happens

    Top businesses have smart people working in IT and Information Security. So why do we suffer from so damned...