It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
The push to transfer patient information to electronic health records (EHRs) has created a number of new concerns concerning healthcare data security. The data contained on these files has become a highly sought after target for cybercriminals. In addition to personal identification information such...
Many companies are moving toward network virtualization to increase the speed, efficiency and flexibility of their IT infrastructure. But in the process, they may be compromising network security, playing a "dangerous game of catch-22," explained Enterprise Networking Planet. While companies make th...
Cloud computing is already among the most disruptive technologies of the decade, and companies are only finding additional reasons to welcome hosted services into their IT ecosystem. But as corporate Software-as-a-Service (SaaS) menus continue to expand, managers must make sure crucial data security...
The Secure Hash Algorithm (SHA) is a family of cryptographic hash functions, now in its fourth generation (SHA-3), published by the National Institute of Standards and Technology (NIST) in coordination with the Federal Information Processing Standard (FIPS) framework. The data security community rec...
As organizations aggregate and integrate information in greater volume and variety, protecting sensitive data has become a much more complex task. While the insights generated from pooling databases and mining reports can be immense, a keen eye should be kept on governance priorities to ensure innov...