4 Key Takeaways | NY Sales Tax on Cloud-Based Document Management Services
Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
Last week, The New York Times reported that men “feel entitled to take time off for family” too. The subject of the article was Josh Levs, a former CNN reporter who wanted more time off when his third child was born...more
On April 10, 2014, Kentucky Governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation. Prior to H.B. 232, Kentucky was one of only four states—including...more