1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts
As organizations aggregate and integrate information in greater volume and variety, protecting sensitive data has become a much more complex task. While the insights generated from pooling databases and mining reports can be immense, a keen eye should be kept on governance priorities to ensure innov...
Hits: 201
0

Posted by on in Cloud
Cloud and virtualization technologies will move data storage away from physical infrastructure, leading to the rise of "invisible" IT in 2013, according to a recent Data Center Knowledge column by industry expert Scott Crenshaw. The year ahead will also be the one in which big data becomes a reality...
Hits: 246
0
Consumer awareness of corporate data collection policies increased significantly in 2012. Heading into 2013, consumers will increasingly expect businesses to protect their privacy, according to a recent CNET article. "Brought on by numerous privacy policy changes to high-profile social networks … b...
Hits: 339
0
Compliance is a common pain point for many organizations, particularly as regulations evolve. Payment Card Industry standards are policed by the major card brands, and each organization has slightly different requirements for following best practices.To help navigate the somewhat nebulous mandates u...
Hits: 507
0
Effective cybersecurity is a highly mobile target, which makes threat information highly valuable for IT professions as they plan for which safeguards to implement. As eWeek columnist Robert Lemos recently noted, it can also serve as a justification for increases in data security spending. However, ...
Hits: 266
0