Quantcast
Channel: c24 Application Hosting Specialists » Security
Browsing latest articles
Browse All 24 View Live

Image may be NSFW.
Clik here to view.

Personally Identifiable Information Hides in Dark Data

To my mind, HIPAA has the most sophisticated view of PII of all the US laws on the books. Their working definition encompasses vanilla identifiers: social security and credit card numbers, and all the...

View Article



Image may be NSFW.
Clik here to view.

Mobile Security: Crunchy on the Outside, Soft on the Inside

When we hear of mobile malware (especially on Android) growing 163 percent or infecting 32.8 million devices in 2012, it’s easy to understand why having a security strategy and solution for...

View Article

Image may be NSFW.
Clik here to view.

Varonis Launches DatAnywhere: Secure File Sharing for Enterprises

Today I’m happy to announce that Varonis DatAnywhere, an enterprise-class file sync and sharing solution, is now GA (generally available).  We’re also hosting a webinar on DatAnywhere this afternoon if...

View Article

Image may be NSFW.
Clik here to view.

TOP METADATA ERA POSTS OF 2013

It’s December and time for us to deliver a retrospective of key topics that defined the 2013 security landscape. This was the year that metadata made the headlines, big data became a reality, and...

View Article

Image may be NSFW.
Clik here to view.

FIVE ENTERPRISE IT PREDICTIONS FOR 2014

1. Knowing where your enterprise’s data is stored is no longer optional. Privacy and other laws vary from nation to nation. Businesses and their remote offices need to know which laws they must comply...

View Article


Image may be NSFW.
Clik here to view.

On Authentication

The basis of any modern security system is authentication—ensuring someone is who they say they are.  By far, the most prevalent means of authentication in use today was invented in the 1960s: the...

View Article

Image may be NSFW.
Clik here to view.

INSIGHTS FROM THE SANS SURVEY ON EVENT LOGGING

SANS Critical Security Controls (CSC) have been getting more attention over the last few years. As security experts come around to focusing on the actual techniques used by hackers, the SANS “offense...

View Article

Image may be NSFW.
Clik here to view.

Designing Technology to Restore Privacy: Deborah C. Peel, MD at...

Great video about privacy, Deborah C. Peel MD real nails it in this TEDx talk.

View Article


Image may be NSFW.
Clik here to view.

5 THINGS PRIVACY EXPERTS WANT YOU TO KNOW ABOUT WEARABLES

There’s been a lot of news lately in the health and fitness wearables space. Apple just announced they’re releasing an app, called “Health,” as well as a cloud-based platform “Health Kit”. Somewhat...

View Article


Image may be NSFW.
Clik here to view.

TOP 5 REASONS WHY ORGANIZATIONS WANT A DROPBOX ALTERNATIVE

During a recent visit to Brazil, I encountered many customers and partners who faced a similar challenge – providing their clients with a safe, secure and genuinely easy way to share files and...

View Article
Browsing latest articles
Browse All 24 View Live




Latest Images