Podcasts

  • Countdown: Top five ways to prevent a security lapse from becoming a security breach

    In this podcast, learn five information security mistakes organizations often make that lead to data breaches, and how to bring resources to bear quickly to mitigate mistakes and avoid a breach.

  • Top Five Ways to Detect Unwanted Data in the Enterprise

    Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that storage has quickly become an inexpensive commodity. It’s often cheaper to just keep everything than to expend time and energy sorting through outdated, irrelevant or inapplicable data. However, this practice can dramatically increase risk to the enterprise by increasing the amount of data vulnerable to an attack. In this podcast, we look at five ways that you can detect the presence of unwanted data in your environment.

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close