Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more

Do Cryptographic Keys Belong in The Cloud?

Thanks to the cloud, organizations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments....
Read more

Mid-sized Healthcare Organizations Need Enterprise-sized Security

Mid-sized healthcare facilities are facing serious network threats. For instance, an Osterman Research report revealed that the healthcare industry is exceptionally vulnerable to ransomware. The repor...
Read more

Three Ways to Get a Head Start in the Age of Privacy

There is a lot to think about with the impending Age of Privacy hanging over all of us. As written in Corporate Compliance Insights, there are three key steps to take when considering how to improve y...
Read more