It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

Posted by on in Cloud
Corporate risk management professionals have needed as much persuasion as any business group before trusting the security credentials of cloud computing. To a certain extent, cloud providers and industry associations have been making progress in stamping out data compliance and protection anxieties ...

Posted by on in Cloud
A recent survey from Rackspace found that many companies are moving to the cloud to save money and increase profits. The survey polled 1,300 companies in the United States and United Kingdom that used the cloud between December 2012 and January 2013. Many companies achieved operational savings...
The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions, now in its fourth generation (SHA-3), published by the National Institute of Standards and Technology (NIST) in coordination with the Federal Information Processing Standard (FIPS) framework. The data security community rec...
With targeted attacks quickly becoming the rule rather than the exception, companies would be wise to contract their defensive perimeters and employ data security As the number of threat vectors multiplies in the era of social, mobile and cloud computing, cybercriminals have a wide variety of t...
With the specter of lost devices, hacked servers and rogue employees fresh in the minds of today's information security professionals, there has been a growing awareness for the merits of data encryption software. Implementation must be a thoughtful process, however, as poorly planned key management...