Data Protection and Black Friday: What you need to Know Posted on 22 November 2016 by Jennifer Dean in Enterprise Security With the valuable data we can glean from Black Friday, IT professionals must focus on data protection. From securing payments according to PCI compliance standards,… Is your cloud security like the wild west? Protect Your… Posted on 21 November 2016 by Kathleen Spaeth in Enterprise Security Learn how to take control of your cloud data security and experience the benefits of virtual machine storage in an AWS environment. Big data encryption: do it right from the start to… Posted on 08 November 2016 by Alex Hanway in Enterprise Security Taking the time from the start to implement a comprehensive big data encryption program will reduce the risk of suffering the painful consequences of a… 8 steps to get started with software localization Posted on 02 November 2016 by Lukas Herbst in Enterprise Security Software localization increases your market around the world. Here are some things you should be aware of before starting. When Things Attack: The Mirai DDoS Attack & IoT Security… Posted on 31 October 2016 by Jennifer Dean in Enterprise Security Many devices lack strong security, and with the volume of internet-connected things, IoT-targeted attacks have the potential to be massive and widespread. It was only… 3 ways your cloud deployment affects compliance 3 ways your cloud deployment affects compliance Posted on 11 October 2016 by Jennifer Hindle in Enterprise Security Take a look at a few of the security issues IT teams will need to take into consideration before jumping on the cloud-first bandwagon. Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 08/11/16 @ 09:11 Feegenie Nice. Thanks for sharing.03/11/16 @ 17:11 Brian Swain Question - Is it your impression that encryption of cellular/mobile voice calls will play a significant role in GDPR implementation, or that such encryption could be plausibly positioned as an effective solution to at least some of GDPR's requirements? Many thanks.26/10/16 @ 09:10 Solutions Granted, Inc. At present, Online security is the most important point. With increasing technology, each and every work is done online and everything needs security. This blog has made everything clear about the efforts of security professionals.