1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...
Hits: 320
0

Posted by on in Mainframe
In the past, data center security was simpler to implement; in fact, there was a time when data center managers could see all the inputs and outputs to the mainframe in one or two rooms. However, this was when data was input via punched cards and output was recorded on tape or impact printers using ...
Hits: 1216
0
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...
Hits: 1801
0

Posted by on in Data Security
Alarming Research According to the 2010 Annual Study: U.S. Cost of a Data Breach by Poneman Institute, a Michigan-based research center that studies privacy, data protection and information security policy, security breaches cost $214 per compromised record and average $7.2 million per data breach ...
Hits: 850
0
The major obstacles that must be overcome to effectively share data between partners are: Different security format standards Different operating system or hardware platform Different security policies The use cases below explore each of these obstacles: Use Case #1: Partner chooses secu...
Hits: 832
0