1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Data that is stored is usually thought of as data-at-rest. It is typically protected by the operating system access controls designed to permit access to only those intended and approved to access the data. Diana Kelley, of SecurityCurve, explains that the myth of the “trusted insider” assumed that ...
Hits: 856
0
Regulation and compliance have had, and continue to, significantly impact data security trends and IT behavior. The following are some of the most instrumental policies and their influence on security operations.Directive 95/46/EC (“Data Protection Directive”)At a European level, sets up a regulator...
Hits: 954
0
There is one thing that has not changed in the last ten years in data security…and that is security professionals are still kept up at night by something. That something is the harsh realization that security is not Boolean. You can never say that you are secure, because what is deemed secure today ...
Hits: 826
0