Interested in business continuity? Here’s a new book that might attract your attention: Becoming Resilient: The Definitive Guide to ISO 22301 Implementation
Browsing: Strategy and Planning
43% of respondents report owing no money to their software vendor from the audit. Of those organizations that did owe money, most owed $50,000-$250,000.
In fact, a recent survey showed that IT professionals are among the worst offenders of shadow IT.
From our overall economy to an individuals social activities, we are heavily reliant on the Internet, cloud computing and data centres.
DatAnywhere 1.5, adding to the functionality of a secure collaboration solution that has gained strong customer adoption in its first year of existence.
Journalists are deploying SecureDrop en mass, from Forbes, New Yorker to Wired. As a result we will begin to see more and broader leaks worldwide.
Ely, England, 12 December 2013 – The coming year will bring a ‘storm of change’ in information security compliance,
Latest Hacker Intelligence Initiative Report Finds Cyber Criminals Adopting Database as a Service for Infection and Data Exfiltration
A few weeks ago, Dell proudly introduced our CONNECTED SECURITY vision and strategy to the world.
A few weeks ago I had the honor of delivering the keynote address at BSidesDFW on defending against social engineering attacks.