Preserving Data Privacy: Where Should You House Your Data?
The prevalence of cloud computing, cloud-based storage and collaboration products only emphasizes these concerns. Many organizations are confused about regulations that protect data in different...
View ArticleStopping the Edward Snowden in your Organisation
In the eyes of some, NSA whistleblower Edward Snowden is a hero who leaked information about top secret state-sponsored surveillance operations to journalists, stoking a global debate on privacy. But...
View ArticleWhere is Data Governance Headed?
Data governance in the cloud is an emotional topic. There are a wide range of opinions when considering the impact of regulations, data sovereignty, the NSA and the Patriot Act. The post Where is Data...
View ArticleWhy It Matters Where You House Your Data
Businesses have legal and ethical obligations to protect information in one jurisdiction and legal requirements to turn that information over in another. The post Why It Matters Where You House Your...
View ArticleCyber Security Framework: Does Your Company Comply?
Stepping up security against cyber-attacks makes perfect sense considering all of the data breaches that have occurred , like Target, Neiman Marcus, etc. The post Cyber Security Framework: Does Your...
View ArticleHow to Protect Your Business Information in the Age of the NSA and PRISM
Information sharing should bring concerns for businesses around how to effectively secure the data being shared from the NSA-like government. The post How to Protect Your Business Information in the...
View ArticleDoes the NSA Have Plans to Infect Millions of PCs with Malware, or Not?
If you who must disclose information with organizations, make sure they have security protocols in place to protect data privacy in the age of the NSA. The post Does the NSA Have Plans to Infect...
View ArticleSecret Surveillance Programs of the NSA: Is Your Data Private?
Submerged in secrecy, the NSA has a prolonged past of gathering intelligence for security, foreign relations and other national security motives. The post Secret Surveillance Programs of the NSA: Is...
View ArticleWhy DRM and Customer managed Keys are Important for Information Security and...
DRM coupled with customer-managed keys (CMKs) in a HSM device allows users to have control over their data and facilitate compliance with regulations. The post Why DRM and Customer managed Keys are...
View ArticleCongress and High Tech Vendors Move to Block NSA Data Snooping
The U.S. House passed an amendment for curbing two activities of the NSA. The vote comes as welcome news to high tech vendors concerned about data privacy. The post Congress and High Tech Vendors Move...
View Article