by leonid | May 25, 2017 | Security, Technology Solutions
As demonstrated by recent security breaches at several large, tech-savvy companies such as Yahoo and Target, data breaches are not a matter of if—but when—they will occur. Your organization has to consider this: what is your plan of action after a data breach, when...
by leonid | May 23, 2017 | Security
Security assessments can mean different things to different people. This paper should help you to explore what a security assessment is. This paper will then provide useful principles for your security assessment projects, with a focus on holistic security management...
by leonid | May 21, 2017 | Security
What is cloud computing? Can your organization have its own cloud? Privately, there are executives that have mocked the use of public cloud in the past, and for good reason: First: Management and Security. There are a number of security issues/concerns associated with...