A cognitive-enabled mobile device management (MDM) solution can do most of the heavy lifting when it comes to keeping track of devices and the users who access them.
When organizations follow frameworks such as Gartner's Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.
The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.
Organizations should take these steps to put their GDPR readiness plans in motion and make the transition as smooth as possible once the regulation takes effect in May.
As passwords fall increasingly out of favor, security leaders should consider augmenting their federated identity management (FIM) systems with blockchain technology to protect user identities.
Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
Once the underdog of the enterprise security world, data security is finally gaining momentum as a driver of revenue.
Open banking promises to make financial services apps more convenient, but there's still a lot of confusion about how financial firms will protect customer data from rogue third parties.
Recent research suggested that organizations around the world are struggling to keep up with their sales goals due to data privacy concerns. According to Cisco’s “2018 Privacy Maturity Benchmark Study,” which analyzed the...
A big data intelligence solution can free up security teams to focus on generating the data security and compliance insights business stakeholders demand in nearly real time.