IT Security
Exclusives


Exclusives

Drivetime vs. Runtime: Applying Motor Vehicle Safety to Application Security

Runtime application self-protection, or RASP, a term coined by research firm Gartner, Inc., is the cyber equivalent of seat belts.

Exclusives

Combating File Sharing Data Leakage

The threat of file data leakage and actual incidents not only adds reputation risk but introduces compliance liabilities ranging from fines and loss of business transactions to possible imprisonment.

Exclusives

Combining People and Technology To Illuminate Dark Data

A look at the steps companies can take to mitigate dark data.

Exclusives

Are You Managing a Global Mobile Perimeter 6.6 Billion Devices Strong?

The traditional network perimeter is a thing of the past. Today, anywhere-anytime access to information is the expectation; striking a balance between security and accessibility is the challenge.

Exclusives

Ten Ways Auditing Helps to Improve Security

Regular auditing helps contribute towards a more secure IT environment.

Exclusives

Why Entrepreneurs Should Take Cyber Risk Seriously

Entrepreneurs must strike a balance between innovation and cyber risk management.

Exclusives

Software Defined Perimeter: The Secret Service of TCP/IP Networks

What the world needs to improve in network security is to reverse the natural sequence of TCP/IP.

Exclusives

How to Stay Cyber Secure During the Summer Slowdown

Before heading off on summer vacation, IT workers “feel the heat” of just how valuable their services are, especially because within many companies, this department is traditionally understaffed and security resources are often constrained.

Exclusives

Data at Rest Encryption – Only One Part of a Data Security Solution

The explosive growth of mission-critical enterprise and cloud data repositories has made the need to review and upgrade cyber defenses one of the IT community’s highest priorities.

WWPI – Covering the best in IT since 1980