3 Critical Requirements of HIPAA Cloud Security
If you’re a covered entity under the Health Insurance Portability and Accountability Act (HIPAA), then you already know that HIPAA is serious business. HIPAA violations carry penalties ranging from...
View ArticleEncryption and Tokenization: Common Pitfalls and Best Practices (Part1)
When it comes to achieving regulatory compliance, encryption and tokenization are two powerful tools in your arsenal. As with any tool, however, having the right tool won’t solve anything if you don’t...
View ArticleHow CipherCloud for Salesforce Chatter Encrypts Sensitive Information and...
For the connected enterprise, Salesforce’s Chatter enterprise social network is a powerful tool. The Salesforce-integrated real-time communication and collaboration increases productivity, streamlines...
View ArticleThe Role of IT in the Era of Cloud Data Protection
There’s no question about it: cloud computing and workforce mobility have forced a dramatic change in the enterprise IT infrastructure. Gone are the days of the network perimeter keeping all data...
View ArticleProtection Against Government Collection of Data Demands Encryption
Ever since Edward Snowden began dropping his bombshells about U.S. and other nations’ electronic espionage practices, enterprises have been wondering how to best protect their sensitive and...
View Article3 Criteria for Choosing a Cloud Data Loss Prevention Solution
The specter of data loss and data leakage looms large over many an enterprise. Every organization has data it needs to protect, whether that data be customer financial information, patient health...
View ArticlePublic Cloud Technology: A Primer for Businesses
In the last several years, few technologies have revolutionized enterprise IT the way cloud technology has. A vast ecosystem of cloud-based infrastructure, platform, and application providers have made...
View ArticleCloud Encryption Gateways: The Basics
The last few years have seen innovations in cloud technology that enable even the most privacy- and compliance-conscious enterprises to make use of cloud computing, allowing organizations to reap the...
View ArticleHow Effective is Cloud-Provided Encryption?
When it comes to cloud data encryption, are all solutions equal? As concerns continue to mount over data breaches, data security, and regulatory compliance, particularly in public cloud environments,...
View ArticleCloud Data Security is a Shared Responsibility
When it comes to adopting the cloud, data security is often amongst enterprise decision-makers’ top concerns. We’ve all seen what can happen to even the largest organizations if they suffer a data...
View Article
More Pages to Explore .....