Cloud computing has been on the minds of many technology administrators and executives. On the business side, it can make a lot of sense. Outsourcing technology resources allows for agility while combating the rising cost usually associated with implementing new technology. However, not everyone is ...
A wide variety of cyber security issues have been echoing in the halls of Congress in recent months, but as of yet, no formal legislation has been passed. At the center of many of these discussions has been the complicated task of proactively pursuing digital threats to national security without vio...
The issue of security inevitably crops up with any cloud migration. Even companies that don't deal with highly sensitive customer data or confidential security reports usually have something they would like to protect. Recent research has suggested that the cloud has become more technologically secu...
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...
As organizations from government agencies to large enterprises shift their focus to information security, it will become more important to ensure that businesses use data protection software as they implement new technology solutions. The data security challenge was recently highlighted at Gartner's...