The issue of security inevitably crops up with any cloud migration. Even companies that don't deal with highly sensitive customer data or confidential security reports usually have something they would like to protect. Recent research has suggested that the cloud has become more technologically secu...
In the past, data center security was simpler to implement; in fact, there was a time when data center managers could see all the inputs and outputs to the mainframe in one or two rooms. However, this was when data was input via punched cards and output was recorded on tape or impact printers using ...
Some business leaders may be surprised to discover that the biggest risk facing organizational data is not from individual hackers or even large groups of cybercriminals. Those high-profile breaches do have a tendency to make headlines, but there is a much quieter threat that all organizations must ...
Hackers have turned to automation as a way to efficiently orchestrate attacks against a large number of targets. Combined with increasingly sophisticated malware, organizations have reason to be a little concerned about the effectiveness of their traditional, perimeter-based defenses such as firewal...
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...