As organizations aggregate and integrate information in greater volume and variety, protecting sensitive data has become a much more complex task. While the insights generated from pooling databases and mining reports can be immense, a keen eye should be kept on governance priorities to ensure innov...
Compliance is a common pain point for many organizations, particularly as regulations evolve. Payment Card Industry standards are policed by the major card brands, and each organization has slightly different requirements for following best practices.To help navigate the somewhat nebulous mandates u...
Cloud security has become a point of contention as IT departments struggle with ensuring corporate data is protected and vendors provide assurances that their architectures are safe. Although there is still some debate over whether the cloud is truly secure, a significant number of businesses have a...
Cybercriminal tactics have evolved to not only become more efficient at stealing sensitive data, but better at hiding hacker activity while doing so. A recent white paper by research firm Frost & Sullivan discussed the risk of advanced cyber threats, noting that traditional information security ...
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...