FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Virtualization creates virtual resources that can be used the same way as any physical resource or application. Disk drive partitioning is a familiar form of virtualization. Servers, networks, desktops, applications, and storage can all be virtual.
Modern corporate networks have become much more dynamic than they used to be. This makes it harder for sysadmins and network admins to know what's connected to the network.
Automation replaces human work in repetitive, tedious tasks, and minimizes the number of errors. With the right automation tools it is possible to automate browser tasks, web testing, and online data extraction, to fill forms, scrape data, transfer data between...
The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.
The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.
Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.