Recent news about elephants, Hillary Clinton’s private emails, and national policy battles on privacy all have one thing in common: Security back doors.
With the recent hack of T-Mobile customer data, companies need to invest more than ever in whatever it takes to secure personal info on their servers.
See why our analyst was wrong about some things said bout encryption — in particular, about the choice of full-disk encryption (FDE) over file / folder encryption, for the purpose of protecting sensitive “data in use” on laptops.
Changing our security technologies – overwhelmingly what was talked about at RSA Conference 2015 – isn’t enough, by itself, to change our thinking of security.
Derek Brink gives us an analysis in words, themes, and statistics, of everything talked about at RSA 2015.
In Part 2, of this blog, Derek Brink looks at two additional insights about security that come from his own recent personal experiences with the Disney MagicBand.
In Part 1 of this blog, here is the first of three insights about security that come from Derek Brink’s recent personal experiences with the Disney MagicBand.
Cloud-based applications and are a win-win, as users experience broader accessibility and enhanced collaboration, while IT staff enjoy faster deployment and easier management.
The means for enterprise mobility and employee privacy to no longer have to be at odds with one another, and can actually coexist in the same enterprise mobility management solution.
Managed file transfer is the foundation for strategic business objectives such as collaboration between individuals, and integration between processes.