dataendure-banner.jpg

DataEndure Blog

Corey Wilburn

Recent Posts

Information Management

How Gemalto's Tokenization System Protects Information

Corey Wilburn | Apr 6, 2017 7:00:00 AM

These days, some online payment processors, particularly mobile processors, rely upon tokenization to help improve security. For example, this technology empowers Apple Pay. Major credit card companies, like MasterCard, Amex, and Visa, are also..

Read More

Information Management- Datacenter Infrastructure

Who does CASB and Why Do We Need It?

Corey Wilburn | Mar 30, 2017 8:00:00 AM

A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company's IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government..

Read More

Information Management

IT Governance Risk and Compliance—Remove the Thorn in Your Side

Corey Wilburn | Mar 23, 2017 8:00:00 AM

In general, governance simply refers to the way that corporations follow business practices that conform to rules. Executives put these rules in place to help balance their own best interests with that of employees, customers, suppliers,..

Read More

Datacenter Infrastructure

HID/HIPS & Information Management: Hardening the Backup Infrastructure

Corey Wilburn | Feb 16, 2017 8:00:00 AM

Let's take a moment to examine the potential of Symantec’s Data Center Security Agents on Veritas NetBackup Appliances

Read More

Information Management

Enterprise Class SSL and TLS Decryption: How to see the unseeable

Corey Wilburn | Dec 7, 2016 8:00:00 AM

Digital encryption can be a tricky, tricky thing.

Read More

Security

How does Cybercrime affect us?

Corey Wilburn | Nov 18, 2016 12:34:18 PM

Since the turn of the century the evolving state of Cyberwarfare and Cybercrime; technologies, capabilities, and resources, has grown by leaps and bounds.  The concepts of advanced threats, sponsored nation-state organizations, and highly..

Read More

Security

Symantec's Advanced Threat Protection Increases Visibility for Your Team

Corey Wilburn | Oct 25, 2016 8:00:00 AM

Being accountable for the hands on work involved with protecting your environment can sometimes be a daunting task.  As technology footprints grow, so does the data that they are producing.  Every engineer’s nightmare is having handfuls of..

Read More

Security

Defensible Deletion Within eDiscovery—Getting Rid of Risky Data

Corey Wilburn | Oct 18, 2016 6:30:00 AM

An average business user sends and receives over 40,000 emails per year, according to a report by the Radicati Group. Multiply that by 100 employees and you’ve got over 4 million emails company wide, annually.

Read More

Security

X is to Y to Z :  Breaches are cheaper than security investments...

Corey Wilburn | Oct 13, 2016 6:30:00 AM

The term “Too Big To Fail” is a commonly heard saying, made prominent by the economic crash in the 2008-2010 era.  I’ll save you the detailed explanation of where this statement came from, as I am sure you are quite familiar with it.  What is of..

Read More

Security

Internet Security and Your Kids

Corey Wilburn | Apr 6, 2016 4:53:31 PM

Where do we begin when it comes to helping our kids be safe online? Given the state of the world, I am sure many of you have already had conversations with your kids about identifying red flags when it comes to their use of the Internet...

Read More