Data Protection March 19, 2015 For Data Security, Catering to the Business Will Be Essential 2 min read - In order to leverage the value of our data security solutions, we must address usability and translate actionable items at the business analyst level.
Cloud Security February 26, 2015 Has Your Cloud Security Become a Juggling Act? 3 min read - Cloud security is what prevents many businesses from making the leap and adopting the cloud to manage their data and protect their information
Application Security February 26, 2015 Software Asset Management: Why It Makes Security Sense 2 min read - How does software asset management (SAM) relate to keeping your data secure? As cybersecurity escalates, so does your software management responsibility.
Data Protection February 18, 2015 Using Outlier Detection to Catch Sneaky Data Breaches 5 min read - Organizations should use outlier detection tools to spot anomalies in their systems that could result in potentially damaging threats.
CISO December 29, 2014 What You Can Learn About IT Security From the Emerging World 3 min read - Make your IT security program more successful and effective through these problem-resolution strategies learned in an emerging country.
Identity & Access December 15, 2014 How to Clean House Before You Implement Your Identity and Access Management Solution 2 min read - Here are some steps to take into account when starting an identity and access management project, including creating user IDs and consolidating systems.
December 4, 2014 More Is Less? EMC Study Finds Data Protection Better With One Vendor 3 min read - According to a recent EMC study, data protection is easier and cheaper when organizations partner with one vendor rather than multiple ones.
Intelligence & Analytics November 25, 2014 The Devil Is in the Details: What’s the Value of IT Security Investments for Security Intelligence? 2 min read - When it comes to security intelligence, it is important to find a way to quantify the positive effects of a security intelligence program.
Intelligence & Analytics November 18, 2014 Data Protection in the Internet of Things 3 min read - As the Internet of Things grows, organizations must reconsider data protection and how they will keep sensitive information safe.
Software Vulnerabilities October 28, 2014 Revelations in Data Protection in the Aftermath of Shellshock 3 min read - Sometimes less is more. But when it comes to data protection, more is definitely more, as proven by new research into the recent Shellshock vulnerability.