Innovative enterprises build a culture that embraces a left-brain/right-brain approach to creative thinking, executing, and communicating, writes Faisal Hoque of BTM Corp.
Two Factor Authentication: SMS vs. Tokens
Are one-time passwords sent via cell phone text messages more secure than traditional hardware tokens?
Taming BIG Data: Taking Back Control, Part 2 - Creation
You have to figure out where your data comes from if you ever want to put controls in place to manage and exploit it, writes information management strategist Stephen Boschulte.
6 Tips for Better Mobile Security
You need to take mobile device security just as seriously as you do for your PCs and laptops.
The CIO’s Guide to e-Discovery in the Cloud
The patch-work of jurisdictions and bolt-on federal rules could leave you in a very bad position if you don't know where your data is, writes Jake Frazier of the Compliance, Governance and Oversight Council (CGOC).
Innovative enterprises build a culture that embraces a left-brain/right-brain approach to creative thinking, executing, and communicating, writes Faisal Hoque of BTM Corp.
Are one-time passwords sent via cell phone text messages more secure than traditional hardware tokens?
You have to figure out where your data comes from if you ever want to put controls in place to manage and exploit it, writes information management strategist Stephen Boschulte.
You need to take mobile device security just as seriously as you do for your PCs and laptops.
The patch-work of jurisdictions and bolt-on federal rules could leave you in a very bad position if you don't know where your data is, writes Jake Frazier of the Compliance, Governance and Oversight Council (CGOC).