Mobile Security Critical for BI
Business intelligence solutions use a company's most important data to chart the business's future course. This centrality to operations means…
Big Data Benefits versus Big Risks [VIDEO]
The recent revelations about the NSA’s secret program makes people aware of the world of big data and the thin…
Why, What and How to Encrypt: Security Expert Insights
Not sure if your organization’s sensitive data is properly encrypted? It’s time to be sure. Chris Heuman, Practice Leader for…
Bring Your Own Software
For the last few years, it’s become very difficult for IT to police who brings personal devices into the enterprise…
BYOD: An Unstoppable Force?
There are not many amongst us who would even consider leaving the house without some kind of mobile device in…
A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…
Big Data Today: Living as Far from 1984 as Orwell
Over the last month I’ve been talking a lot about personally controlled records and the ownership of your own information.…
Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats
Last Thursday, the U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations; seeking…
Business Continuity and Disaster Recovery
When considering business continuity and disaster recovery options, there’s really only one constant from business to business: it’s important to…

