Data Sovereignty

Data Sovereignty, Safe Harbor & General Protection Regulations

First, an explanation on the concepts in the title of this piece. Data Sovereignty is the concept that digital data and information is subject to the laws of the country in which it is located and/or created. Safe Harbor is an agreement between the USA and EU that regulated and control import, export and processing of personal data and information. And the most recent, EU General Data Protection Regulation (GDPR) is the regulation of “processing’, ownership, rights and storage of personal data and information within the 28 member EU states.

network security

4 Myths About Network Security

When you hear the words “network security,” what comes to mind? Do you believe your network is invulnerable against any threats? And do you think it’s something you don’t need to worry about? If that’s the case, keep reading. This blog post will expose the myths of network security, and what you need to know to keep your corporate data safe.

Black Friday

Tips for Retailers to Keep Your Data Secure This Black Friday

According to Wikipedia, “in 2014, $50.9 billion was spent during the 4-day Black Friday weekend”. People are eager to jump on the great Black Friday and Cyber Monday deals! What else comes with these amazing sales? Thieves and cybercriminals! They prey on the uninformed organizations that keep their guard down, ready to steal your customer’s credit card information!

Opal, Opalite & Pyrite Self-Encrypting Drives (SED) Specifications

Opal, Opalite & Pyrite Self-Encrypting Drives (SED) Specifications Simplified

This year (2015) the Trusted Computing Group (TCG) Storage Work Group (SWG) published two new specifications derived from the Opal SED specification called Opalite and Pyrite. You may already be familiar with the benefits of using an Opal SED vs software encryption in your laptops and desktops, but are puzzled as to why there are 2 new standards. Perhaps you even wonder if they would be a better fit for your needs than Opal.

Cloud Computing you are responsible and accountable for security

Cloud Computing: You Are Responsible and Accountable for Security

It’s all about the data. I have been involved in cloud computing since 1999 (although we called it multi-tenant hosting & ASP – application service provider) and for sixteen years security has consistently been the #1 concern when organizations are asked about their adoption of cloud models. The concern does not reside with the use of a storage array they have no access to or the utilization of a virtual machine cluster in some unknown data center, it’s all about the data and sensitive information.

Security Software

Never Fear Manual Provisioning Again: The Smart Person’s Guide to Multi Device Security Software

The thought of provisioning multiple devices can strike fear into the heart of even seasoned professionals. It’s a situation in which a great deal can go wrong, leaving the IT department on the hook. Provisioning multiple devices doesn’t have to be a nightmare, though. Consider this your guide for making multi device security software provisioning simple and hassle-free.

data encryption

“We’ve Been Hacked!”: 3 Questions to Ask Before Assigning Blame

Imagine this: your worst nightmare has taken place. You’ve found out that you’ve been hacked. Your most valuable data is now in someone else’s hands, and your company is going to suffer enormous damage to its reputation. What do you do now? Your first instinct is probably to assign blame. Here’s what you should do instead: ask the following questions about the hack. They’ll help you make sense of it.