Results tagged "PII"
Total Search Results : 4
February 23, 2012 01:00 PMSeveral months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."
February 07, 2012 11:00 AMWith data access no longer restricted to the four walls of the enterprise (or branch) and 9-to-5 business hours, enterprises that have traditionally relied on a perimeter-based approach to security are now seeing the benefits of a data-centric approach. Data encryption is paving the way for the transition to data-centric security methods, according to a survey of 506 IT professionals.
February 15, 2010 12:00 PMMany enterprises are still under the delusion that they can do more or less what they want with individuals' personal information. The European Union, many states (including California with its data breach law), and now Massachusetts are attempting to disabuse them of that notion. But this situation is not only about how to achieve compliance with disparate laws; it should also be a wakeup call informing enterprises that they now have to manage information for more than what they consider to be their primary business processes.
January 19, 2007 05:00 AMInadvertently exposing customers' personally identifiable information is a sure way to land your company in hot water. On tap to help: enterprise-ready privacy compliance systems, or PCSs, the next evolutionary
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.