New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities  and allow civil RICO claims. BY NICK AKERMAN On January 2015, the Obama administration announced a series of proposals to strength­en the...
0 comment

NetApp Is Accelerating Your Data Protection Strategy to the Clouds

Improving data backup and recovery continues to be a top priority among senior IT decision makers, as highlighted in a 2015 IT Spending Intentions survey conducted by ESG. Organizations plan to invest...
0 comment

See the Big Picture in Big Data

This infographic shows how HP Haven delivers innovation across the enterprise, including improving your business operations and pinpointing security risks 100%, and how Haven can help you know your customers...
0 comment

Accelerating Audits with Automation

Many organizations have to respond to the queries of internal or external auditors and demonstrate that access to their unstructured data is being properly controlled. How do you know who can access...
0 comment

Insider Threats: Malice, Mistakes and Mountain Lions

The goal of this whitepaper is to help you understand the most common insider threats and provide actionable tips to help protect against them. First we’ll take a look at the actors involved in insider...
0 comment

US Data Protection Compliance and Regulations

US privacy and data protection laws have centered around securing personally identifiable information against unauthorized access. In recent years, lawmakers have focused on safeguarding consumer financial...
0 comment

11 Things IT Should Be Doing (But Isn’t)

This free whitepaper outlines 11 things that most IT departments aren’t doing, but should. As a result, sensitive data is unprotected and being accessed by the wrong people, expensive storage is littered...
0 comment

Board Oversight of Cyberrisks: Directors and Officers Litigation

The duty of a board to monitor and oversee organizational risk includes cyberrisks. As cyberrisks and incidents proliferate, boards are seeking to enhance the information they receive about cyberrisks...
0 comment

Your Data Has Left the Building; What Are You Doing to Protect It?

In the past, protecting corporate data was simply a matter of managing the servers in the data center. But in today’s mobile world, the availability of portable devices and the convergence of work...
0 comment

Why Endpoint Backup is More Critical Than Ever

New research dives deep into the trends and drivers for enterprise endpoint backup. The mobile mind shift is here, and as employees increasingly favor using mobile devices–both personal and company-issued–for...
0 comment