For more than a decade, Christy Wyatt was immersed in mobile security - most recently as CEO of Good Technology. Now she has re-emerged as CEO of Dtex Systems. What new challenges does this role pose to the veteran security and technology leader?
The shift to cloud computing is driven by many factors, but the economics of the cloud are at the top of the list. Having access to virtually limitless compute resources that are accessible on-demand
and at consumption-based pricing is turning computing into a utility, just like we consume electricity.
The...
Business enablement and ease of collaboration are among the many benefits of cloud apps, but the adoption of these services is often a double edged sword. They enable employees to legitimately share content, but they also make it easier to inadvertently overshare content or share it with the wrong people.
Download...
A virtualização de rede representa um grande avanço para ajudar as organizações a perceberem os benefícios da velocidade para trazer novos serviços ao mercado, da agilidade para adaptar-se às necessidades do negócio e da segurança da informação. É equivalente ou superior aos benefícios fornecidos pela...
With comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.
Many healthcare organizations embark on cloud migrations to achieve scalability, cost-efficiency, and higher application performance. But migrating applications to the cloud can be a complex process that requires careful planning and deliberation. Challenges can include unanticipated interoperability issues,...
Hospitals and other healthcare organizations are in the midst of a major digital revolution that's forcing them to change their traditional ways of capturing, storing, and sharing information. To keep up with their needs for greater IT infrastructure agility, performance, security, and compliance, many savvy...
You know you are adopting Office 365. Whether you are just wading in with a partial Exchange Online deployment, jumping right into the deep end with a full-cloud, everything Office 365 adoption or something in-between - the decision is made and you are moving forward as fast as you can. Before you take off running...
The writing is on the wall. Nearly every company will move to Office 365 sooner or later. Data sharing and data movement are key elements of any O365 adoption - from an Exchange Online plan that comes with a 50GB mailbox, the Outlook app, and OneDrive to the full ProPlus packages. Starting with the very first step, a...
As more healthcare organizations turn to cloud vendors for services, infrastructure and data storage, they still retain responsibility for making sure that patients' health information remains secure. But how can organizations ensure the security of PHI while, at the same time, enable agile information technology...
Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
The rising cost of pharmaceuticals is an unfortunate reality that can render patients unable to afford medication. This struggle was evident to Dr. Michael Rae who created the Rx Savings Solutions app that helps consumers save on prescription costs. Dr. Rae is a medical expert, but since technology is not his forte,...
The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
The...
While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, very little thought or effort is dedicated to security inside the data center. Once perimeter firewalls are breached, malicious attacks are generally able to propagate laterally inside the data center with...
Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.