It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
Effective cybersecurity is a highly mobile target, which makes threat information highly valuable for IT professions as they plan for which safeguards to implement. As eWeek columnist Robert Lemos recently noted, it can also serve as a justification for increases in data security spending. However, ...
Bring-your-own-device has complicated the data security ecosystem significantly, as information moves from company-provisioned and managed devices to personal smartphones and tablets. The trend has afforded workers extended mobility and access to corporate resources from anywhere, but it has also gi...
Mobile application development is quickly evolving from pet project to business necessity within corporate IT departments. But whether it's constructing an enterprise app store that caters to the demands of digital native employees, or a slate of customer-facing convenience tools, companies must kee...
The issue of security inevitably crops up with any cloud migration. Even companies that don't deal with highly sensitive customer data or confidential security reports usually have something they would like to protect. Recent research has suggested that the cloud has become more technologically secu...
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...