The importance of encryption and key management for security practitioners
In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how if you’re going to do encryption, make sure you do it …
Strengthening trust in a highly connected world
As consumers, we increasingly expect anytime-anywhere access and personalized service, whether online at home, on-the-go with mobile devices, or in a store or branch location. …
Product spotlight: Qualys Continuous Monitoring
Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an …
Do ethics get in the way of security professionals?
While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …
Total data protection outside the firewall
Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …
Product spotlight: Entrust IdentityGuard
All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities. …
Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Classification and protection of unstructured data
In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data …
Why saying YES is changing information security
In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how the information security is a very different place than 5-10 …