It’s time to get ahead of the next tranche of regulations, but beware of lawyers playing it safe.
IT is predictably unpredictable, so whether or not blockchain will live up to the hype is anyone’s guess.
What other ancient software layers do you rely on? And to the security researchers: Enough with the hyperbole, already.
Previous attempts at password replacements have failed. Be cautious of dancing on the bleeding edge.
Should you enforce #DeleteFacebook on your users’ phones?
It's become an industry-standard form of data collection for years. But the news cycle has a way of catching up when you least expect it.
Can you trust any browser extensions? IT shops might want to consider extension blocking as a policy.
This one's a call-to-action: Urgently review cloud-storage policies, IAM, ACLs, etc. And audit any data-sharing partnerships.
Only data-centric security protects against the most serious threats. Here's why you should use it.
Data masking can solve your compliance headaches and ensure safe software delivery. Here's how it's done.

Pages