Insider Threats: Malice, Mistakes and Mountain Lions

The goal of this whitepaper is to help you understand the most common insider threats and provide actionable tips to help protect against them. First we’ll take a look at the actors involved in insider...
0 comment

US Data Protection Compliance and Regulations

US privacy and data protection laws have centered around securing personally identifiable information against unauthorized access. In recent years, lawmakers have focused on safeguarding consumer financial...
0 comment

11 Things IT Should Be Doing (But Isn’t)

This free whitepaper outlines 11 things that most IT departments aren’t doing, but should. As a result, sensitive data is unprotected and being accessed by the wrong people, expensive storage is littered...
0 comment

Board Oversight of Cyberrisks: Directors and Officers Litigation

The duty of a board to monitor and oversee organizational risk includes cyberrisks. As cyberrisks and incidents proliferate, boards are seeking to enhance the information they receive about cyberrisks...
0 comment

PROPOSED FEDERAL BREACH NOTIFICATION LAW: PANACEA OR FLASH IN THE PAN?

By:  Robert E. Cattanach and Bradley W. Hammer,  Dorsey & Whitney The Obama Administration has just released the proposed text of the Personal Data Notification & Protection Act as the latest...
0 comment

Solving Your Top 5 Email Archiving Challenges

Despite the popularity of text and social media, email is still the number one tool for business communication and collaboration. It’s more important than ever to establish an email archiving strategy...
0 comment

The Critical Need for Endpoint Data Protection

The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions...
0 comment

5 Strategies for Modern Data Protection

Most enterprise IT organizations today struggle to even finish backups at all. And it’s very likely that an IT organization that has trouble getting backups completed in limited time windows will...
0 comment

5 Fundamentals of Virtual Server Data Protection

The benefits of server virtualization are compelling and are driving the transition to large-scale virtual server deployments. From cost savings recognized through server consolidation or business flexibility...
0 comment

5 Steps to Application-Aware Data Protection

Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But application owners need to know that they’ll be able...
0 comment