In January, the European Union proposed new comprehensive data protection legislation designed to force businesses to improve their data security practices and better protect private customer information.Read More
Now that a large number of cloud-based services have been available on the market for several years, the adoption of the technology is approaching a global scale as businesses around the world leverage innovative solutions to improve efficiency and cut costs.
Since its beginning, cloud computing has often been recognized as a paradox, giving businesses the ability to enhance mobility, agility and overall productivity at the cost of inherently weakened IT security capabilities.
The cloud is often recognized as one of today’s most disruptive technologies, as it allows organizations to completely reinvent IT and how they do business.
When the term “cloud” was coined a few years ago, businesses saw the technology as a way to completely transform operations.
As the business environment continues to expand and become competitive with more firms entering the landscape, companies are finding they need to deploy innovative solutions to stay on pace with rival firms.
Recently I became a victim of identity theft. Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number. I’ve spent the last 10 years marketing Internet security solutions, but now I know firsthand how painful it can be to individuals when a data breach occurs….Read More
Dave Asprey and Jonathan Gershater bring up good points in their blog posts about the USA PATRIOT Act (“The USA PATRIOT Act is Bad for Business” and “Patriot Act is not the first (nor likely) last law of its kind”). The U.S. might seize your data or other governments might gain access for a multitude of…Read More
Perhaps bubonic plague is uncommon, but influenza or cold germs are easily transmitted in the public domain. What degree of assurance do you have that when you check into your hotel room, that it is safe and sanitized? The hotel employs a cleaning staff and adheres to standards of cleanliness and hygiene to ensure your…Read More
Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important. But with today’s cloud computing, mobile devices, and advanced persistent threats (APTs), businesses need security that protects their data wherever it travels and in whatever type of device it resides, requiring new data-centric security. …Read More