night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
  • Select Category
Archive
  • Archive
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Why Data Visibility is Important for Security
Ludmila Rinaudo March 16, 2021
Why Data Visibility is Important for Security

Today, organizations are struggling to control their data environments. The amount of data created is forecasted to grow and be spread in a wide diverse ecosystem: the cloud,…

Read More
Guest Blog: TalkingTrust. What’s driving the security of IoT?
Ellen Boehm March 11, 2021
Guest Blog: TalkingTrust. What’s driving the security of IoT?

The Urgency for Security in a Connected World Connectivity enables powerful, revenue-generating capabilities…from data telemetry and runtime analytics, to effectively…

Read More
International Women’s Day 2021: Celebrating Diversity and Inclusiveness
Patricia Brailey March 8, 2021
International Women’s Day 2021: Celebrating Diversity and Inclusiveness

March 8 is International Women’s Day. With the theme #ChooseToChallenge, this year’s celebration is important to the whole world as the challenge is to call out gender bias…

Read More
The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud
Paul Hampton March 4, 2021
The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Trust is a much-debated topic in cloud security. It is as important as privacy, security and compliance. With customers increasingly being less trusting of how companies store…

Read More
Data Beyond Borders: The Schrems II Aftermath
Mukesh Chandak March 2, 2021
Data Beyond Borders: The Schrems II Aftermath

On July 16, 2020 the Court of Justice of the European Union issued the Schrems II…

Read More
Overview of Authentication Mechanisms
Danna Bethlehem February 25, 2021
Overview of Authentication Mechanisms

The need for anytime, anywhere access to enterprise applications has transformed the security strategy that organizations must employ to keep the bad actors away from corporate…

Read More