- August 26, 2013
Big data presents numerous data governance challenges: Regulatory compliance, information security and risk management and are all complicated by the amount of data generated by the average ...
- August 15, 2013
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.
- August 08, 2013
In this Product Spotlight, we look at two new risk management assessment tools intended to better secure and protect your organization's private data.
- July 24, 2013
Gaping holes in U.S. cybersecurity -- especially vulnerabilities relating to trade secrets -- remain a top concern for the Obama administration as it struggles to get industry on board with digital ...
- July 17, 2013
Is your organization gathering and properly acting upon risk intelligence? Our latest Product Spotlight roundup focuses on risk-centric GRC tools.
- July 11, 2013
The NSA scandal has sparked worldwide talks on cybersecurity regulation as countries hammer out cyberprotection policies to guard digital information.
- July 08, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) It's tempting to hang on to every document and every email message we create and receive because we ...
- June 28, 2013
Opinions abound regarding Edward Snowden and his leak of a secret NSA surveillance program, as U.S. officials increase efforts to extradite him.
- June 19, 2013
In this SearchCompliance Product Spotlight, learn how new tools from MAM solutions providers can help you manage risk at your organization.
- June 10, 2013
An NSA program's surveillance activities are leading to discussions on online privacy issues and widely varying opinions on where to draw the line.
- June 03, 2013
Facebook's review of its hate speech policy drew much online commentary, with some praising the move while others saying it violates free speech.
- May 31, 2013
Compliance regulations, including those targeting the finance industry, are in place to protect sensitive personal information, right? Apparently some people at the giant, "mega banks" didn’t get ...
- May 30, 2013
As BYOD continues to proliferate in the workplace, mobile device security remains a top IT priority, according to a recent SearchCompliance survey.
- May 17, 2013
Information governance expert Jeffrey Ritter discusses how technology for e-discovery evolved, and how it influences data processes and management.
- May 16, 2013
In this Product Spotlight, learn about two new security platforms from vendors CipherCloud and MetricStream.