Electronic discovery, or eDiscovery, can play a central role in the corporate litigation process, and is increasingly expensive as companies retain more data and employees store that...
Social media takes all of your relationships that otherwise would be separate, and throws them into a single group called "friends." You have no way to separate...
For years now, we as security practitioners have been perceived as a road block to project timelines and overall efficiency of the business. Many security shops carried...
But Can Cloud Services Meet These Needs?
Cloud vendors have already recognized the huge potential of hosting a virtual backup site for large enterprises. I have seen marketing...
"Everything is on the table now, and you can bet that when the smoke clears, budgets and processes will be a whole new animal."
Many people discuss bubbles,...
If you're like me and you were around back when hardware and software were essentially dominated by the Wintel crowd, you probably remember something very troubling...
Most of the SPAM we see today comes in with a variety of hooks, the most dangerous being those looking to steal data and account credentials. Because...
Enterprise IT budgets have been fleshed with funds for what most consider a core defense; antivirus protection. Many others have gone by what best practice says to...
Improvements to Web infrastructure have allowed cloud computing to prosper. Now firms can run applications online, allowing their employees to be far more flexible. This, of course,...
Is GRC just another industry acronym or is this the one we've been waiting for?
Over the past decade, we have all been bombarded with the latest and...
As security practitioners we're always looking for ways to secure the enterprise and all of the assets within. Many times, we focus inward when analyzing anything that...