LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …

The Impact of Data Breaches on Reputation & Share Value

This Ponemon Institute research report examines how a company's reputation, share value, and customer loyalty can be affected by a data breach, from the perspective of IT practitioners and marketers. As part of its research, Ponemon surveyed consumers to learn their expectations about …

Veeam + Microsoft Combine to Offer Rapid Time to Value for Cloud Data Protection

IDC estimates that more than 70% of organizations have a cloud-first application deployment strategy to align with digital transformation initiatives. As such, many organizations are transitioning to Microsoft Office 365 and utilizing public clouds such as Microsoft Azure.However, IT …

ESG: The Spectrum Data Protection Portfolio from IBM Is a 'Must See'

In this report, analysts from the Enterprise Strategy Group (ESG) discuss:Root challenges facing IT team members when trying to achieve virtualization protection and recovery Trends in how organizations are trying to achieve effective data management and enablement IBM Spectrum …