Data breach scenarios are the stuff of nightmares among IT security professionals, but logic tells them that it may only be a matter of time before their organizations fall victim to an external attack or internal mistake. When disaster strikes, the degree of damage is often dependent on how teams h...
As companies continue to place a greater emphasis on sharing and analyzing enterprise information, employees at all levels of the organization are starting to assume data management responsibilities. Unfortunately, this push for fluid communication and strategic interpretation has taken sensitive as...
News headlines may make it sound like there's always an organized cybercriminal syndicate waiting to break down the firewall and steal everything in the corporate network. Flashy headlines and referencing scary hacktivist groups may be good for the media, but those strategies also take attention awa...
Cloud service providers faced an uphill battle in 2012 when trying to recruit business from firms with especially sensitive and/or highly-regulated workloads. But now that companies have recognized the viability of traditional data security solutions and hosts have emerged with more refined risk man...
Cloud and virtualization technologies will move data storage away from physical infrastructure, leading to the rise of "invisible" IT in 2013, according to a recent Data Center Knowledge column by industry expert Scott Crenshaw. The year ahead will also be the one in which big data becomes a reality...