It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions, now in its fourth generation (SHA-3), published by the National Institute of Standards and Technology (NIST) in coordination with the Federal Information Processing Standard (FIPS) framework. The data security community rec...
Cloud computing strategies have only been on corporate IT radars for a few years now, but during the time, the way those teams perceive, procure and regulate the technology has changed significantly. The latest Ponemon Institute report details widespread progress since the release of its 2010 predec...
With targeted attacks quickly becoming the rule rather than the exception, companies would be wise to contract their defensive perimeters and employ data security As the number of threat vectors multiplies in the era of social, mobile and cloud computing, cybercriminals have a wide variety of t...
Critical infrastructure vulnerabilities are among the most disturbing cybersecurity realities of the day, and they even received mention in last week's State of the Union Address. As public and private sector security experts debate solutions, one of the more promising options could be a new take on...
For the better part of 2012, cloud service providers had to combat the misconception that their digital underpinnings were somehow inherently less secure than on-premise offerings. A healthy dose of reason has been brought to these debates in recent months, however, and companies are starting to see...