It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
Although data security is cited as one of the most important considerations for IT professionals, many companies worldwide still rely on insufficient safeguards. A recent survey conducted by B2B International found that 35 percent of businesses don't use data encryption software. The survey polled ...
The U.S. Department of Defense recently released a report that outlined clear security regulations that would need to be established before it widely adopts cloud computing practices within its offices. The report, released in January, explains that some of the security requirements may include...
A new report from Burning Glass Technologies found that demand for cybersecurity professionals has grown more than 3.5 times faster than the demand for other IT jobs over the past five years. It has also increased more than 12 times faster than the demand for all other non-IT jobs, explained Co...
The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions, now in its fourth generation (SHA-3), published by the National Institute of Standards and Technology (NIST) in coordination with the Federal Information Processing Standard (FIPS) framework. The data security community rec...
With targeted attacks quickly becoming the rule rather than the exception, companies would be wise to contract their defensive perimeters and employ data security As the number of threat vectors multiplies in the era of social, mobile and cloud computing, cybercriminals have a wide variety of t...