Five key benefits of data encryption for security

Five key benefits of data encryption for security

There are no perfect data security measures and security solutions. There is no way to prevent a data breach. However, even if your precautionary cybersecurity measures fail, there is a simple way to render the leaked or stolen data virtually useless to cybercriminals...
The Magical Implementation – Preshow Audience

The Magical Implementation – Preshow Audience

A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale(Based on a Data Classification implementation but applicable to most large End User Impact implementations) Preface Dana McMullan is founder...
How to Get Usage Details With Software Metering

How to Get Usage Details With Software Metering

Each year, hundreds of billions are spent on enterprise software, IT and cloud services. Mounting economic uncertainty creates pressure to ensure your money is well-spent. In this piece, we hope to show how software usage metering, the practice of accurately...
Spelljacking: When your browser is too helpful

Spelljacking: When your browser is too helpful

Spelljacking is a low-risk yet fascinating vulnerability that could result in sensitive data like your login credentials being sent unencrypted to Google or Microsoft servers. It serves as a reminder that security risks can emerge just from the complex interactions of...