The proliferation of bring-your-own-device and the consumerization of IT have made it harder for enterprises to keep tabs on sensitive information and are forcing CIOs to replace old processes with data strategies that are sensitive to new realities. In this primer on enterprise data protection, experts offer guidelines for mitigating the risk of breach, such as eliminating redundancies, expanding authentication beyond the network perimeter and ensuring users are adequately informed about what's at stake.

Full Story:

Related Summaries