It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Matt Little

Matt is a technologist at heart and has more than a decade of experience in the IT industry. In his role as VP Product Development, Matt oversees planning, development and lifecycle management for next generation PKWARE offerings including Viivo and vZip. Matt also plays a critical role in setting and driving product strategy and go-to-market activities for these products.


Prior to his current role, Matt held jobs as MIS/IT Director and IT Manager for PKWARE. Prior to PKWARE, Matt worked for Compuware and Johnson Controls. Matt graduated from Marquette University with a BS in Computer Science.

Posted by on in Cloud
Every day, dozens of your employees are leaving the office completely naked. Yes, your busiest and most savvy employees are streaking from their cubicles. Attorneys au natural. Bond buyers in their birthday suits. But don’t dial the HR department. Or the police. (Or a freelance photographer.) It’s...
Wikipedia recently raised issues with NSA surveillance of the domain and related Wikimedia properties, and declared that it would change its encryption protocols to ensure more secure data exchange between sites and users. The change appears to have been particularly motivated by the reve...

Posted by on in Cloud
Cloud computing has been one of the fastest growing tech developments of the last several years. The promise of lowered hardware and maintenance costs coupled with increased versatility and agility have driven numerous companies to pursue cloud solutions. However, data security concerns regarding t...
Passwords continue to create data security issues and may need to be phased-out in favor of more secure alternatives, argued a recent petition from a group of Silicon Valley technology companies. Multi-factor authentication and identification may be one way forward in light of more prevalent hi...
Inconsistent enforcement of BYOD security has resulted in many C-level executives presenting grave risks to their companies' record of secure data exchange, according to ZDNet contributor Spandas Lui. The unique risk posed by executive users was discovered and explained in a recent Austral...