Posted on 07 April 2015 by
On April 22nd, I’ll be presenting at the annual RSA Conference in the Expo Briefing Center on “Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control” (session ID CSV-W02). In this session, I’ll cover the cultural changes that organizations should adopt in order to address the complex issues surrounding data access in the […]
Posted on 23 February 2015 by
SafeNet solutions now give you the ability to encrypt sensitive workloads in the IBM SoftLayer cloud platform and own and manage your keys
Posted on 19 February 2015 by
The sole entity responsible for the security of the data is YOU—from the moment you take possession of it to the moment it’s deleted. No exceptions.
Posted on 26 January 2015 by
By following the three rules outlined in our ebook, organizations can keep their identities, data, applications, and infrastructure safe.
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 11 December 2013 by
Expect 2014 to be a year in which new authentication schemes will be embraced and further change the way we protect our accounts and identities in the cloud.