IDC PlanScape: Building Compliant Cloud Environments TAGS: cloud computing | compliance “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →
May 3, 2024
IDC PlanScape: Building Compliant Cloud Environments TAGS: cloud computing | compliance “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →
3 Tips for a Smooth Data Loss Prevention Rollout TAGS: data loss prevention | DLP Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →
DHS’s CDM Program Moves to the Next Phase: Protection TAGS: CDM From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal …Continue reading →
IDC PlanScape: Deploying Multifactor Authentication TAGS: multifactor authentication “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →
HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: business associates | HIPAA The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many different …Continue reading →
Closing the Cybersecurity Generation Gap TAGS: configuration management | content filtering | multifactor authentication | security awareness Businesses around the world find their workforces increasingly divided along generational lines. As the Boomer generation nears retirement, they find …Continue reading →
Hacking Small Companies is Big Business Information security often takes a backseat to other issues that small business owners face. With more immediate concerns, such as …Continue reading →
Six Most In-Demand New Cybersecurity Certifications TAGS: CISSP | security certifications Cybersecurity is one of the hottest fields in information technology and skilled cybersecurity professionals are in high demand. Threats to enterprise …Continue reading →
10 Things Your Business Manager Wishes You Knew TAGS: business managers | EDUCAUSE Partnerships between technology managers and business managers are critical to the success of higher education IT organizations. The expertise in …Continue reading →
App container, app wrapping and other emerging mobile security tactics TAGS: application wrapping | containerization | MDM The flood of personal devices entering organizations through both formal bring your own device programs and informal use of personal …Continue reading →