Category: Security

author:

Database Networks Security Systems

The Legacy IT Pro


In the fast-paced world of IT, can you afford to be a legacy IT pro? This is a concern for many, which makes it worth examining. IT functions have been clearly separated since the early days of mainframes. You had your storage team, your …


author:

Security

Landing on a Secure File Sharing Solution


Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work done without the friction. One point I made in that post was that “if an …



author:

Security

Non-IT File Sharing and HIPAA Implications


When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I really started digging into it that a whole world of real-life examples opened up …





Security

Is Threat Intelligence For Me?


“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber, but still a lot of these hits apply, and you can see why at …


Security

All Data is Not Created Equal


“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider spending more time protecting the vast bytes that make up your corporate data. As …