There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on…
Browsing: Data protection
David Fisk of Quorum relates how an organisation’s CryptoWall intrusion could have been different had instant recovery technology been in place.
A report by the Intercept claims that American and British spies jointly hacked into Gemalto to get hold of encryption…
Charles Foley of Watchful Software provides a few tips for businesses when considering what to do next in order to keep data secure.
Cyber resiliency fuels company growth; new Ponemon Institute study will help define and measure cyber resilience in collaboration with leading…
As just reported, a sophisticated ring of hackers has stolen up to $1Bil from more than 100 banks in 30 countries.…
Most companies of scale have cyber security measures in place – software solutions, policies and protocols, and regular assessments conducted…
Many companies are introducing Bring Your Own Device (BYOD) schemes to their working practices.
Security experts comment on the White House’s creation of a new federal agency to coordinate the United States’ cyber threat intelligence.
Sue Trombley of Iron Mountain urges customers to understand the full implications (and changes) involved with the new EU data protection proposals.