Mobile application development is quickly evolving from pet project to business necessity within corporate IT departments. But whether it's constructing an enterprise app store that caters to the demands of digital native employees, or a slate of customer-facing convenience tools, companies must kee...
At this point, there is no shortage of cloud computing advocates highlighting the technology's commercial potential. But just as cost control and competitive differentiation are leading business priorities, so too is risk management. Most importantly, that means protecting sensitive data as it migra...
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...
A wide variety of cyber security issues have been echoing in the halls of Congress in recent months, but as of yet, no formal legislation has been passed. At the center of many of these discussions has been the complicated task of proactively pursuing digital threats to national security without vio...
Technology experts have long warned organizations against the threat of the potential aftermath of a data security incident. The good news is that the majority of organizations have listened to those concerns. However, recent research suggests that there is a disparity between data security fears an...