The AVC’s of Cybersecurity in the Cloud

Related Posts

How to vet your third-party data destroyer

Sometimes the best IT tool is a good, old-fashioned hammer. Pros in charge of trashing old hard drives have been known to smash, throw, or drill them. Anna Vladimirova-Kryukova, a data-privacy consultant and member of the ISACA Emerging Trends Working Group, tried the hammer method once. “It was not an

Read More »