External hackers and insider threats. Customer expectations and government mandates.
Data protection is a complex challenge, and it demands attention at every level of an organization. PKWARE's in-house experts are here to help you stay up to date on best practices, emerging trends, and new resources for enterprise data security.
PKWARE is excited to be in this year’s CRN®, a brand of The Channel Company, Partner Program Guide! The annual guide features partner programs from technology vendors that provide products and services through the IT channel. CRN® evaluated vendors based on investments in program offerings, partner profitability, partner training, education and support, marketing programs and resources, sales support and communication.
With less than two months to go before the GDPR effective date, companies around the world are beginning to flip the switches on the new products, business processes, and communication campaigns they’ve implemented in hopes of complying with the law.
Despite the EU’s efforts over the last two years to explain what the regulation requires and how it will be enforced, a great deal of uncertainty remains. Until GDPR supervisory authorities begin to issue fines for noncompliance—and organizations begin to challenge those fines in court—no one can say for sure which of the law’s provisions deserve the most attention.
The GDPR’s much-publicized "right to be forgotten," however, seems certain to generate interest on the part of consumers, corporations, and supervisory authorities from day one.
After two years of controversy and confusion, the era of the GDPR is about to begin. As of May 25, Europe's groundbreaking General Data Protection Regulation will have the force of law in all 28 EU member nations, fundamentally changing the way businesses and government agencies deal with personal data.
Who owns cybersecurity?
Cyber attacks negatively impact governments, corporations, and individuals on a daily basis. One of the many reasons for our ongoing vulnerability is that we lack a cohesive approach for defending US interests against cyber threats. It has become painfully clear that neither the government nor the private sector can solve the problem on its own. There must be a joint effort in protecting our country’s national interest in terms of cyber security.
PKWARE is proud to announce that CRN, a brand of The Channel Company, has named Rick Hofmann, Vice President of Channels and Alliances, to its prestigious list of 2018 Channel Chiefs. The executives on this annual list represent top leaders who excel at driving growth and revenue in their organization through channel partners.
No one expects politicians to be experts on every subject. Elected officials and agency directors have to make decisions on dozens of complicated issues, many of which lie far outside their areas of expertise. That's why public discussion and expert opinions have always played key roles in shaping our laws and policies.
Here at PKWARE, we're deeply involved in the ongoing debate about strong encryption, and whether governments can (or should) require backdoors for encrypted communications and devices. While some politicians have advocated against backdoors, many others in Congress and law enforcement continue to call for measures that would make our data less private and less secure.
Cybersecurity isn’t the easiest thing in the world to visualize. Since we don’t actually see information as it travels across networks or is written to disks, it can be difficult to picture exactly what needs to happen in order to keep data safe.
So just for fun, we’re going to do a bit of time travel to see what today’s data protection concepts would look like if they were applied to paper files instead of digital ones. We don’t need to go back too far—40 years will do the trick—to arrive at a time when the vast majority of information was still being created and stored on paper.
Imagine, if you will, that it’s 1978. Most large companies are already using computers to perform certain tasks, and early adopters are beginning to buy personal computers like the TRS-80 and Apple II. The majority of workers, however, still do their work on paper, and that’s what you’ll be doing today after your $1.75 taxi ride to the company headquarters.
In the life of every important technology, there’s a tipping point—a moment when the technology ceases to be a niche product or an emerging concept and becomes a part of everyday life. For mobile phones, to choose an obvious example, that moment came almost twenty years ago. For cloud computing, it was perhaps five years ago. For encryption, it’s happening now.