Posts tagged with ‘security’

  • 20 Questions InfoSec Will Ask About Your Awesome Cloud Project

    With technology budgets increasingly managed outside of IT, it’s not unusual for enterprise business units to champion new cloud...

    By in 08.31.16
  • How to Undo the Voodoo of A Ransomware Attack

    Ransomware attacks are in the rise, impacting not just Windows systems but Android and Macs as well. These…
    By in 03.07.16
  • 3 Steps to Manage, Protect and Secure Decentralized Data

    To say that we live in a data-rich world is an understatement. Every day, we create and store 2.5 quintillion...

    By in 03.02.16
  • 4 Lessons from Recent Data Breaches

    Security in the Digital Age: 4 Lessons from Recent Data Breaches

    Recent data breaches, including 2015’s infamous Ashley Madison hack, have shown the world two valuable lessons: in the age...

    By in 02.25.16
  • How IT and InfoSec Can Address Legal Hold Challenges On Mobile

    IT teams have often been clueless about how to facilitate eDiscovery requests on their organization’s’ mobile devices. This demand...

    By in 08.26.15
  • At Opposite Ends of the Internet Consolidation Tightrope: Accountability, Security, Privacy, and the Future of the Internet

    The Internet, like other computing resources, operates on a pendulum swing: from centralized to decentralized, from rampant innovation to...

    By in 08.11.15
  • Training Users to Get Clueful about IT Security

    Everyone in IT wants employees to be educated about security —  if for no other reason than it’s a...

    By in 08.04.15
  • 5 Black Hat Presentations I Don’t Want to Miss (and Neither Do You)

    In my 30+ years in the computer industry, I’ve attended hundreds of tech conferences. Somehow, though, I’ve never made...

    By in 07.28.15
  • A Data Breach Is Inevitable: 6 Ways to Protect the Organization Before It Happens

    Top businesses have smart people working in IT and Information Security. So why do we suffer from so damned...

    By in 07.21.15