Data breach scenarios are the stuff of nightmares among IT security professionals, but logic tells them that it may only be a matter of time before their organizations fall victim to an external attack or internal mistake. When disaster strikes, the degree of damage is often dependent on how teams h...
As companies continue to place a greater emphasis on sharing and analyzing enterprise information, employees at all levels of the organization are starting to assume data management responsibilities. Unfortunately, this push for fluid communication and strategic interpretation has taken sensitive as...
News headlines may make it sound like there's always an organized cybercriminal syndicate waiting to break down the firewall and steal everything in the corporate network. Flashy headlines and referencing scary hacktivist groups may be good for the media, but those strategies also take attention awa...
The healthcare industry has been an avid adopter of new technology such as the cloud and mobile devices. The proliferation of electronic health records has yielded significant advantages for doctors and other health professionals, but technology deployments may be accelerating faster than data secur...
Consumer awareness of corporate data collection policies increased significantly in 2012. Heading into 2013, consumers will increasingly expect businesses to protect their privacy, according to a recent CNET article.
"Brought on by numerous privacy policy changes to high-profile social networks … b...