• How IT and Information Security Can Address Mobile eDiscovery Challenges

    08.26.15 | By in Trends

    IT teams have often been clueless about how to facilitate eDiscovery requests on their organization’s’ mobile devices. This demand...

  • Who Makes The Decision To Go Cloud … and Who Should?

    08.21.15 | By in Trends

    It’s a predictable argument: Should the techies — with their hands on their keyboards — be the people who...

  • Your Datacenter is Dying: It’s Time to Rethink Information Governance  

    08.18.15 | By in Trends

    With the transition of data from the datacenter to the cloud – or perhaps more lyrically, from the core...

  • Gartner: Designing an Enterprise Mobility Strategy That Actually Works

    08.12.15 | By in Trends

    The number-one question clients ask Gartner research director Michael Disabato is, “Which enterprise mobility management solution should I buy?”...

  • At Opposite Ends of the Internet Consolidation Tightrope: Accountability, Security, Privacy, and the Future of the Internet

    08.11.15 | By in Trends

    The Internet, like other computing resources, operates on a pendulum swing: from centralized to decentralized, from rampant innovation to...

  • Black Hat 2015 Survey: The Challenge of Data Sprawl

    At Black Hat 2015, professionals in IT security, network engineering, and IT infrastructure gathered to fortify their defenses against...

  • Training Users to Get Clueful about IT Security

    08.04.15 | By in How To

    Everyone in IT wants employees to be educated about security —  if for no other reason than it’s a...

  • Amer Sports Uses the Cloud to Level the Privacy Playing Field

    07.29.15 | By in Druva News

    Laws governing data privacy are changing quickly. Concerns over spying, corporate espionage, and employee protection all have inspired complicated...