Endpoint December 2, 2015 Holiday Online Shopping a Challenge for Enterprise Security 2 min read - Online shopping is popular during the holiday season, but enterprises must protect themselves from possible security risks brought about by this practice.
CISO November 24, 2015 The 4×4 Security Program and Organization: Security Portfolio Prioritization 4 min read - Managing a security portfolio means prioritizing projects and identifying the value that these activities bring to an enterprise.
Mainframe November 24, 2015 What Are the Risks of Legacy Infrastructure? 2 min read - Using legacy infrastructure does more than drive up the costs of maintenance; it also hinders innovation and increases risks related to security.
September 2, 2015 Deception Tools and Techniques Offer Game-Changing Potential for Enterprise Security, Gartner Says 3 min read - Enterprise security can benefit from the implementation of decoy and deception tools, which Gartner predicts will be essential for future data protection.
CISO July 6, 2015 The Declaration of Mobile Independence and Data Bill of Rights 5 min read - Can employees and enterprises come together to form a Bill of Rights for mobile device management? It may be necessary for the future of IT and security.
Application Security May 1, 2015 How to Dramatically Improve Your Database Encryption 4 min read - Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
Application Security April 29, 2015 No Authentication Without Trust 3 min read - Identity authentication should only be conducted after the person trying to access data or information has been deemed trustworthy by the organization.
CISO April 27, 2015 Security Management: Embracing Millennials in Your Security Program 4 min read - Security management teams can benefit from millennial employees if they take steps to attract top talents and retain them with unique benefits.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
Data Protection April 24, 2015 Top Tips for Surviving a Data Encryption Project 3 min read - Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.