This is the second installment in a multipart series about data encryption. Be sure to read part one for the full story. Now that we understand the common threats facing organizations and how to select the right solution for data-at-rest encryption (DaRE), what’s the next step in your data encryption…
Read More
Next time someone says it’s difficult for women to advance in the global security or technology sector, point them in the direction of IBM. At the very top of the tree is Ginni Rometty, global CEO, who is joined by Shamla Naidoo as the chief information security officer (CISO) —…
Read More
The whole point of IT security is to minimize risk, and risk is, ultimately, a financial reality. A well-run organization practices risk mitigation by not only using the best tools, services and methods for maximizing data security, but also increasingly by augmenting great security with the right cyber insurance. As…
Read More
I’ve been working in the security industry for mumble mumble years, and one recurring problem I’ve noticed is that security is often considered an add-on to business initiatives. This is neither new, nor surprising. And while the “customer-first” approach is not really a new talking point for most companies, “customer-obsessed”…
Read More