Monday, April 19, 2021

Sonny Discini

The Agony and Ecstasy to eDiscovery

Electronic discovery, or eDiscovery, can play a central role in the corporate litigation process, and is increasingly expensive as companies retain more data and employees store that...

How Does Social Media Affect the Enterprise?

Social media takes all of your relationships that otherwise would be separate, and throws them into a single group called "friends." You have no way to separate...

Improving Security Through Regulatory Compliance

This article will look at what the health care industry is doing to meet HIPAA compliance, save on IT costs and ensure security is baked in...

Cybersecurity Metrics That Matter

For years now, we as security practitioners have been perceived as a road block to project timelines and overall efficiency of the business. Many security shops carried...

Cloud Computing and the New Network Center

But Can Cloud Services Meet These Needs? Cloud vendors have already recognized the huge potential of hosting a virtual backup site for large enterprises. I have seen marketing...

Is Your IT Security Budget Sustainable?

"Everything is on the table now, and you can bet that when the smoke clears, budgets and processes will be a whole new animal." Many people discuss bubbles,...

Smartphones and Security Don’t Mix

If you're like me and you were around back when hardware and software were essentially dominated by the Wintel crowd, you probably remember something very troubling...

Using Sender Policy Framework to Fight Spam

Most of the SPAM we see today comes in with a variety of hooks, the most dangerous being those looking to steal data and account credentials. Because...

Guide to Protect Against Malware in Enterprise

Enterprise IT budgets have been fleshed with funds for what most consider a core defense; antivirus protection. Many others have gone by what best practice says to...

When the Cloud Storms on You

Improvements to Web infrastructure have allowed cloud computing to prosper. Now firms can run applications online, allowing their employees to be far more flexible. This, of course,...

GRC Tools Promise an Escape from Compliance Chaos

Is GRC just another industry acronym or is this the one we've been waiting for? Over the past decade, we have all been bombarded with the latest and...

Re-imagine IT: Energy Costs, Security and the Road Ahead

As security practitioners we're always looking for ways to secure the enterprise and all of the assets within. Many times, we focus inward when analyzing anything that...

Latest Articles

IT Planning During a Crisis

Without a doubt, 2020 changed everything. I like to compare it to a science fiction movie where time travel is involved. Clearly, we have...

Best Data Quality Tools &...

Data quality is a critical issue in today’s data centers. The complexity of the Cloud continues to grow, leading to an increasing need for...

NVIDIA’s New Grace ARM/GPU Solution...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...