It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
Recent blog posts
As technology evolves, so does the complexity of cyberattacks against companies. With more than 250,000 pieces of new malicious code detected every day, explained The Guardian, it has become increasingly difficult for organizations to protect themselves from attacks that will result in lost dat...
The U.S. Department of Defense recently released a report that outlined clear security regulations that would need to be established before it widely adopts cloud computing practices within its offices. The report, released in January, explains that some of the security requirements may include...
A new report from Burning Glass Technologies found that demand for cybersecurity professionals has grown more than 3.5 times faster than the demand for other IT jobs over the past five years. It has also increased more than 12 times faster than the demand for all other non-IT jobs, explained Co...
Cloud computing is already among the most disruptive technologies of the decade, and companies are only finding additional reasons to welcome hosted services into their IT ecosystem. But as corporate Software-as-a-Service (SaaS) menus continue to expand, managers must make sure crucial data security...
The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions, now in its fourth generation (SHA-3), published by the National Institute of Standards and Technology (NIST) in coordination with the Federal Information Processing Standard (FIPS) framework. The data security community rec...