It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

Cybercriminals have continually adapted their methods to meet the ever-changing realities of the internet landscape, tweaking their tools to address the exploits present in revamped network security protocols. However, many of the tactics used by hackers have required them to directly approach a tar...
Espionage has recently come to the forefront of the cybersecurity discussion. Although financially motivated crimes still account for the lion's share of data breaches, Verizon's "2013 Data Breach Investigations Report" found that state-backed cyberspies were responsible for 19 percent of cyberattac...
McAfee E-Business Server customers received an End-of-Life notice last year. If you are like other customers we hear from, this raised a sense of urgency to find a suitable replacement and you are now faced with looking at the options. As you examine these options, we recomm...
The rise of bring-your-own-device (BYOD) policies and the proliferation of mobile networks have created new information sharing needs within the enterprise. More businesses are looking for solutions that will allow them to share company data files with employees across an array of devices and networ...
The rise of bring-your-own-device (BYOD) policies in the heatlhcare industry has presented a number of new challenges for IT teams tasked with fortifying data security. BYOD has become popular among medical professionals, with nearly 89 percent of healthcare organizations allowing physicians an...