1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Effective cybersecurity is a highly mobile target, which makes threat information highly valuable for IT professions as they plan for which safeguards to implement. As eWeek columnist Robert Lemos recently noted, it can also serve as a justification for increases in data security spending. However, ...
Hits: 265
0

Posted by on in Data Security
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...
Hits: 291
0

Posted by on in Data Security
The modern business world is faced by the challenge of ever-expanding data volumes. While mountains of information are normally associated with analytics trends such as big data, the amount of digital content in general is rapidly expanding. According to IDC's predictions for 2012, the total amount ...
Hits: 509
0
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...
Hits: 319
0
Technology experts have long warned organizations against the threat of the potential aftermath of a data security incident. The good news is that the majority of organizations have listened to those concerns. However, recent research suggests that there is a disparity between data security fears an...
Hits: 835
0