encryption Tag

In my previous blog I discussed the five components of a successful video governance strategy: Assessment, Access, Encryption, Approval, and Retention.  I discussed best practices for addressing each of these areas, but didn’t address the “how.” How you enforce security, governance, and retention policies requires a critical...

Your company's adopted a cloud-first strategy. Your DevOps initiative is steaming along, and your processes are lean and agile. But how well are you protecting cloud-based resources? Do you even know what's in the cloud, and who has access to it? Using Nemertes' real-world data, find...

As enterprises adopt team chat applications, IT leaders should examine security tools. End-to-end encryption, for example, can provide key access to messaging servers. More companies are now using team chat applications, such as Atlassian HipChat, Cisco Spark, Microsoft Teams, RingCentral Glip and Slack. As a result,...