The digital world is defined by two types of hackers: those who wish to exploit computer networks, and those who wish to protect them.
Browsing: Breaches
Wherever we go, we find WiFi hotspots to help us stay connected to our very own ‘digital lives’. However, we hardly stop and think about our WiFi security
Dimension Policy Map aggregates disparate information about policies, interfaces, applications and related traffic flows, and presents it in a simple
Wearables – smartwatches and miniature electronic devices like Google Glass – are the new class of personal connected devices
Another day, another headline! Security breaches continue to dominate the news as one major corporation after another has fallen victim…
A recent study commissioned by Netskope reveals most businesses feel cloud providers fail to comply with data protection laws and regulations.
Daren Glenister of Intralinks has compiled a list of data security tips for on-the-go.
When it comes to cloud computing in the age of HIPAA Compliance, encryption has become the accepted best practice.
Easy Solutions, the Total Fraud Protection® company, has announced that it now supports the use of the DMARC draft specification within its customer base.
IRM is a technology every organization should be evaluating now—preferably before the next big breach hits the headlines.