According to Nextgov, federal government agencies reported almost 70,000 cyber security incidents in 2014 — a jump of 15 percent from the pr...
  Just like clouds can hide sunshine, they can also hide user activity from the security controls deployed by the business in the worl...
By Dan Virgillito   Establishing a penetration testing methodology is becoming increasingly important when considering data security ...
  Cyber attacks, maleware, phising, Denial of Service Attacks - where do enterprise security threats end? The short answer is it never...
  By Dan Virgillito With the number of employees telecommuting, traveling often or working remotely on the rise, the conventional co...
  The HeartBleed bug was very bad taking down servers all across the Internet. It is a serious vulnerability in the popular OpenSSL cr...
  IBM has struck yet another gangbuster partneship. This time with Intel. Their July announcement of a Global partnership with Apple t...
    By: Dwayne Melancon   Now that things are settling down after Heartbleed, I think about some of the conversations I’v...
  Most businesses have routine occasion to discard confidential data about their business operations or personal client information ac...
Data security management continues to be a top business challenge for CIOs, CTOs, and Senior IT professionals in small, medium, and large bu...



White Papers