How Security Leaders Might Minimize Human Error
A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…
Data Tampering: The Quiet Threat
For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however,…
No, You Don’t Need a Blockchain
November 1, 2018
Database
The hype around blockchain technology is reaching a fever pitch these days. Visit any tech conference and you’ll find more than a handful of vendors offering it in one form…
Do You Need an On-Prem Storage Vault?
October 15, 2018
Database
Data protection has traditionally involved an on-prem storage vault, but as data protection solutions evolve, this requirement is becoming increasingly optional. On-prem storage vaults exist because if you do away…
Data Protection: Culture, Tools, People, and Roles
September 6, 2018
Security
In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this post, I’ll be going over the data protection…