Search

1 to 2 of 2
Sort by

Blog Entry
Protecting data across its lifecycle with governance and security

Exploring best practices for data in use and data in motion Author: Karen Madera Organizations collect a tremendous amount of data from a variety of sources and any of these data sources could potentially contain sensitive data. Data is often relocated for warehousing, reporting,...


Blog Entry
Introducing 1touch.io to the IBM Security Family!

Security and privacy start with a basic premise: there is something sensitive that needs to be protected or kept away from some unnamed foe. Addressing data security and privacy is by no means an easy task – it requires a cultural shift as well as technology that complements and integrates. So...

CYNTHIA LUU's profile image