It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

A recent survey of 250 senior IT decision makers in the U.K. found that, although 84 percent claimed they were concerned or very concerned about IT security breaches, 55 percent have not tested the security systems and procedures of cloud vendors. The study, conducted by IT recruitment consultancy R...

Posted by on in Data Security
The modern business world is faced by the challenge of ever-expanding data volumes. While mountains of information are normally associated with analytics trends such as big data, the amount of digital content in general is rapidly expanding. According to IDC's predictions for 2012, the total amount ...
Mobile application development is quickly evolving from pet project to business necessity within corporate IT departments. But whether it's constructing an enterprise app store that caters to the demands of digital native employees, or a slate of customer-facing convenience tools, companies must kee...
Cloud computing has been on the minds of many technology administrators and executives. On the business side, it can make a lot of sense. Outsourcing technology resources allows for agility while combating the rising cost usually associated with implementing new technology. However, not everyone is ...
Tagged in: Cloud
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...