Securing the Breach, Part 1 – Accept It, Then Protect…
Posted on 18 March 2014 by
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 18 March 2014 by
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 27 January 2015 by
With the Internet of Things (IoT) fast upon us, the technology landscape is quickly evolving to be more connected, mobile, and pervasive. This evolution is entirely dependent on the emergence of a new breed of smart devices that will prove an incredible amount of insight into many aspects of our everyday lives. At the same […]
Posted on 10 April 2015 by
A new study has found that 67% of the finance executives queried have increased their spending on cyber security measures during the past year. But are they spending wisely?
Posted on 27 July 2015 by
If you find yourself doing patchwork deployments when what you really want is a smart, long-term data protection strategy, then it’s time to enable encryption as an IT service.
Posted on 15 April 2015 by
The new Data Security Confidence Index results highlight perimeter defense spending, how worried IT decision makers are about data breaches, and customer data protection.
Posted on 16 April 2015 by
This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. It’s fitting that the theme for this year’s RSA Conference is “Change: Challenge Today’s Security Thinking,” because change is exactly what many corporate security programs need to do if they’re going to effectively safeguard […]