by admin | May 1, 2020 | Blog
The Data Lifecycle Management (DLM) goes through 5 steps: creation, usage, transport, storage and destruction. Most companies have parts of this lifecycle under control, but that means there are lots of areas for gaps in the control measures that could let a threat...
by admin | Apr 29, 2020 | Blog
Privacy is all about protecting the rights of the client from unauthorized disclosure or use of their PII. (Personally identifiable information) Take the example of a process that receives an input from a data feed that contains PII. This information is processed and...
by admin | Apr 27, 2020 | Blog
We have seen a lot of problems with Adobe vulnerabilities. Adobe has been getting beat up with all the negative publicity in the past few months. Apple is restricting access to Adobe on their devices. Has anyone tried their remote desktop sharing? I wonder if some...
Recent Comments