It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

Protecting against damaging data breaches has become a critical component of enterprise IT departments, yet these costly incidents still occur with regularity across many different industries. The fallout from failing to deploy strong data security solutions can result in numerous financial losses f...

Posted by on in Infographics
A History Rooted in Innovation PKWARE has a history rooted in innovation starting with the invention of the .ZIP standard in 1986. PKWARE continues to innovate and evolve with the ever-changing data security landscape. Today, PKWARE helps organizations reduce and secure their data across all major ...
Tagged in: .ZIP PKZIP SecureZIP vZip
With so many stories emerging every day regarding data breaches at major corporations or government agencies, it would be easy to assume that cybercriminals solely target large enterprises and ignore small and medium-sized businesses (SMBs) and individuals. However, this perception does not mat...
Many government and industry oversight committees have attempted to encourage the further proliferation and adoption of data security solutions by establishing regulations outlining specific measures that must be met by organizations. By providing enterprises with a financial motivation for increasi...
The ongoing battle between data security professionals and cybercriminals has often been described as an arms race. The two opposing forces at times appear to be stuck in a perpetual cycle of developing new tools to address advancements made by their adversaries. As much as governments and security ...