1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts
As companies continue to place a greater emphasis on sharing and analyzing enterprise information, employees at all levels of the organization are starting to assume data management responsibilities. Unfortunately, this push for fluid communication and strategic interpretation has taken sensitive as...
Hits: 186
0
News headlines may make it sound like there's always an organized cybercriminal syndicate waiting to break down the firewall and steal everything in the corporate network. Flashy headlines and referencing scary hacktivist groups may be good for the media, but those strategies also take attention awa...
Hits: 373
0
IT security has been governed by the paradigm of layering defenses in recent years, and it can be an effective way of mitigating digital risks. Frequent revision and continued improvement makes sense for cybersecurity because of the dynamic nature of the threat landscape. However, Dark Reading's Tim...
Hits: 284
0
The healthcare industry has been an avid adopter of new technology such as the cloud and mobile devices. The proliferation of electronic health records has yielded significant advantages for doctors and other health professionals, but technology deployments may be accelerating faster than data secur...
Hits: 218
0

Posted by on in Cloud
Cloud service providers faced an uphill battle in 2012 when trying to recruit business from firms with especially sensitive and/or highly-regulated workloads. But now that companies have recognized the viability of traditional data security solutions and hosts have emerged with more refined risk man...
Tagged in: Cloud Data Encryption
Hits: 317
0