The European Union’s General Data Protection Regulation is the most influential privacy law in the world. It is inspiring privacy laws far beyond Europe. In addition, GDPR is also having a a global effect on how cryptography is used for data secu...
Decisions have consequences.
Somewhere in my formative years the decision rule that “you are free to make the choice … but not free to choose the consequences” became lodged in my head. Some choices have inconsequential ramifications (e...
As a technology leader, some of the most important and impactful decisions your organization will rely on you to make concern the security of your organization’s infrastructure and applications. Today’s enterprise systems rely on encryption to protec...
Telecommuting, working out of coworking spaces, working from home a couple of days a week, and the support of the increasingly international mobile professional were common themes before the pandemic swept across the world in early 2020. The office still...
Coupled with the many advantages brought by cloud computing and the growth in digital content, virtualization is critical to any enterprise that is looking to reduce fragmentation and allows IT Managers and CISOs to employ techniques that will ensure pol...
Cloud services enable customers to host servers, data, and run business and productivity applications. Going with the cloud fast tracks time to market, reduces the maintenance burden on overworked IT professionals, and provides access to software stac...
On October 4, 2021, a rather misfortunate event occurred that nearly stopped the social world from turning. Well, not really, turning but it did wreak havoc across the social and investment spheres. Facebook and its allied portfolio of services R...
For any business that mandates operational agility and the utmost security, adopting Modern IT is a must. Infrastructures built on modern IT enable organizations to take advantage of innovative new technologies and approaches, that will also enable the...
Financial institutions rely on cryptography to meet many compliance goals, including internal control and satisfaction of regulatory mandates. If an institution is meeting a compliance goal, it should be able to persuade a third party, such as an auditor...