information security

Combating information security threats—and keeping your job

When it comes to information security systems, not having the right deployment, training and execution can have devastating collateral damage. Here are some lessons learned on how to deploy information security—or host intrusion—systems in an enterprise environment.

Continue reading

sensitive data security

Three incorrect cloud consumer security expectations

Talking to industrial client executives about their security expectations for cloud services can be enlightening. There are three areas where the assumptions and expectations are often wrong. Let’s have a look at each of these false expectations and set the record straight.

Continue reading