Your data might be under attack. Right now. "Surely not," you say? Think again.
For organizations that use in-house data centers and IT services, the task of protecting sensitive data can be hindered by the difficulty of detecting a breach. According to a recent article in InformationWeek, most bus...
As the consumer market debates whether the iPhone 5 is a significant improvement in style and functionality over the iPhone 4S, the business sector must answer questions like: Can the organization protect its data when employees bring their iPhones into work? As Wireless Week columnist Keith Mallins...
A totally integrated solution for data reduction, security and authentication in a single secure data container PKWARE offers complete portability for reducing, securing, moving and storing data across the extended enterpriseā¦both internally and externally, from mainframes to desktops and into the c...
Technology professionals often have to come face-to-face with the reality that it may be impossible to establish a 100 percent secure system. Even with the best firewalls and antivirus solutions in place, weaknesses can emerge from improper configuration or out-of-date software versions. However, wh...
Effective data security is closer than many organizations may think. In fact, effectively guarding data may just be a matter of implementing affordable technology and ensuring that it is configured properly.
In an interview with GovInfoSecurity, Rebecca Herold, head of Rebecca Herold & Ass...