In today's global office, IT security leadership spends a great deal of time and resources creating a defense-in-depth approach to data security. This often includes layering on both logical and physical solutions as well as detailing out policies and procedures for accessing company data in a secure manner.
Larry Ponemon |
05 Feb |
Read more
In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places.
Larry Ponemon |
17 Dec |
Read more
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. Companies like Facebook and Google market their open-office floor plans to potential employees, touting that the design allows workers to work closely together and fosters a culture of collaboration.
Larry Ponemon |
26 Aug |
Read more
Imagine this situation.
Larry Ponemon |
31 May |
Read more
What threats to a company's sensitive and confidential data are getting worse, staying the same or actually becoming more manageable?
Larry Ponemon |
17 Dec |
Read more
Companies are not embracing encryption as a way to protect sensitive data. According to Ponemon Institute's 2005 National Encryption Survey, only 4.2 percent of companies responding to our survey say their organizations have an enterprisewide encryption plan.
Larry Ponemon |
28 Dec |
Read more
Wireless devices are a great way to keep in touch with the office. But
does your staff know how important the safety features are?
A cautionary tale.
Larry Ponemon |
05 Jun |
Read more
It's not what's outside the door. We offer six best practices for good
information security management.
Larry Ponemon |
24 Apr |
Read more
Responsible information management allows you to achieve compliance with regulations, create trust with your users and benefit yourself while you're at it.
Larry Ponemon |
27 Feb |
Read more