Agile business models are pretty much a necessity in today's enterprise world and IT security is certainly no different.
It’s that time of the year again when employees flock to their favorite sports streaming sites to watch college basketball.
Electronic Health Record (EHR) adoption in healthcare has been rocky and uneven. Many physicians and practices still find EHRs inadequate or poorly designed.
Handle.exe is a 3rd party tool that can help track down a process that is locking down a file you are trying access. Here is how.
The CISO (Chief Information Security Officer) position is complex and demanding. With an ever-expanding threat landscape, the CISO navigates a complex web of responsibilities that run the gamut from staying ahead of cyberattacks, managing security teams, and analyzing...
Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.
An outage in Amazon Web Services’ Simple Storage Service (S3) reminded us why you need a business recovery strategy.
Compliance with security and privacy requirements is difficult. Compliance with a number of different regulations, some geographic, some industry-specific, can seem almost impossible. And when a new, large-scale requirement, like New York’s new cybersecurity regulation...