Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments
I see sessions popping up in conferences and articles lately prophesying the demise of DLP and that DLP has run its course and is something companies should avoid. I have to ask a simple question: Why is it when attackers get more creative and cunning ...
Blog Entry by Phil Harris | 29 Mar 2013 | 5 comments
You know, it’s 2013 and we still have this issue of employees believing that corporate data is their own to do with as they please. In a recent Ponemon survey report ~two thirds of employees believe this to be true. Unfortunately, this is an incredibly ...
Blog Entry by Phil Harris | 20 Mar 2013 | 1 comment
I came across this article (see link below) not too long ago and it really got me thinking about not only the places where I put my information on the Internet, but the reasons I put my information out there.  Most sites we put our information seem ...
Blog Entry by Phil Harris | 07 Mar 2013 | 0 comments
There's a growing buzz in the industry about "who" should be responsible for encryption in the cloud from a user perspective.  As usual, the technology to do this is not the hard part – crypto is crypto is crypto, etc.  It's really ...
Blog Entry by Phil Harris | 21 Jan 2013 | 1 comment