These days, some online payment processors, particularly mobile processors, rely upon tokenization to help improve security. For example, this technology empowers Apple Pay. Major credit card companies, like MasterCard, Amex, and Visa, are also..
A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company's IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government..
In general, governance simply refers to the way that corporations follow business practices that conform to rules. Executives put these rules in place to help balance their own best interests with that of employees, customers, suppliers,..
Let's take a moment to examine the potential of Symantec’s Data Center Security Agents on Veritas NetBackup Appliances
Digital encryption can be a tricky, tricky thing.
Since the turn of the century the evolving state of Cyberwarfare and Cybercrime; technologies, capabilities, and resources, has grown by leaps and bounds. The concepts of advanced threats, sponsored nation-state organizations, and highly..
Being accountable for the hands on work involved with protecting your environment can sometimes be a daunting task. As technology footprints grow, so does the data that they are producing. Every engineer’s nightmare is having handfuls of..
An average business user sends and receives over 40,000 emails per year, according to a report by the Radicati Group. Multiply that by 100 employees and you’ve got over 4 million emails company wide, annually.
The term “Too Big To Fail” is a commonly heard saying, made prominent by the economic crash in the 2008-2010 era. I’ll save you the detailed explanation of where this statement came from, as I am sure you are quite familiar with it. What is of..