French data protection officers are messing with the big ones: the French data protection authority "Commission Nationale de l'Informatique et des...
IT audits can be daunting for many companies. Mistakes seem inevitable for complex enterprise organizations, but don’t they have to be. With some...
With data breaches a near-constant headline, the search for the perfect Chief Security Officer is on. If you don’t have one, now’s the time to get...
Shadow IT remains a thorn in the side of enterprise organizations trying to prevent the next big data breach. Here’s why shadow IT is an issue for...
We’re more than halfway through the year now, and there’s some good news in the world of data breaches. Well, maybe not “good” so much as “somewhat...
Security compliance may seem like a hassle for an enterprise organization, but there are several benefits that every CEO and IT professional should...
Enterprise companies are spending more on the cloud in 2018. Financial services, which harvest the credit card info and sensitive data of customers,...
Despite some progress, cloud security remains a challenge for many enterprise companies according to the recent Gemalto/Ponemon Institute Global...
There is still no nationwide privacy policy in the U.S. That could change soon.
Cloud productivity and collaboration software has made it easier than ever to communicate with co-workers. But you should be using encrypted...
Digital encryption remains a vital necessity for enterprise companies that collect, handle, and store sensitive information in the cloud. Here’s why.
Privacy legislation and corporate data protection policies are compelling increasing numbers of companies to consider encryption for their cloud...
Data protection on premise is slowly dwindling due to the rapid adoption of cloud computing. Is there still room in the world for on-premise...
Finances are undoubtedly one of the areas of life in which most people attach the most importance to data protection. That's understandable, after...
A formal compliance audit could expose massive vulnerabilities in your company’s security systems. Follow these four best practices and run your own...