It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
There is a common myth that regulation and compliance, such as PCI and Basil II, benefits data security. In other words, thanks to these mandates data is more secure …where it otherwise would not be. In reality, it quite possibly could make some organizations much less secure. How could a regulation...
Projects always need to be completed and delivered under certain constraints. Traditionally, the three constraints have been referred to as the Project Management Triangle. One side of the triangle cannot be changed without affecting the others and each side represents a constraint as follows:● ...
As IT environments evolve and the plethora of data is unleashed, the methods of security responses shift in light of the changes. Here’s a quick review of how popular trends are reacting to a decade of transformation.Perimeter SecurityThe true realization with protecting data is that the perimeter i...
Data that is stored is usually thought of as data-at-rest. It is typically protected by the operating system access controls designed to permit access to only those intended and approved to access the data. Diana Kelley, of SecurityCurve, explains that the myth of the “trusted insider” assumed that ...
Regulation and compliance have had, and continue to, significantly impact data security trends and IT behavior. The following are some of the most instrumental policies and their influence on security operations.Directive 95/46/EC (“Data Protection Directive”)At a European level, sets up a regulator...