- September 04, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) All organizations depend on information to manage day-to-day operations, comply with regulations, gauge ...
- August 29, 2013
The online debate surrounding the NSA's data-gathering activities persists, as revelations surrounding the PRISM program continue to come to light.
- August 26, 2013
Big data presents numerous data governance challenges: Regulatory compliance, information security and risk management and are all complicated by the amount of data generated by the average ...
- August 15, 2013
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.
- August 08, 2013
In this Product Spotlight, we look at two new risk management assessment tools intended to better secure and protect your organization's private data.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- July 24, 2013
Gaping holes in U.S. cybersecurity -- especially vulnerabilities relating to trade secrets -- remain a top concern for the Obama administration as it struggles to get industry on board with digital ...
- July 17, 2013
Is your organization gathering and properly acting upon risk intelligence? Our latest Product Spotlight roundup focuses on risk-centric GRC tools.
- July 11, 2013
The NSA scandal has sparked worldwide talks on cybersecurity regulation as countries hammer out cyberprotection policies to guard digital information.
- July 08, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) It's tempting to hang on to every document and every email message we create and receive because we ...
- June 28, 2013
Opinions abound regarding Edward Snowden and his leak of a secret NSA surveillance program, as U.S. officials increase efforts to extradite him.
- June 19, 2013
In this SearchCompliance Product Spotlight, learn how new tools from MAM solutions providers can help you manage risk at your organization.
- June 10, 2013
An NSA program's surveillance activities are leading to discussions on online privacy issues and widely varying opinions on where to draw the line.
- June 03, 2013
Facebook's review of its hate speech policy drew much online commentary, with some praising the move while others saying it violates free speech.
- May 31, 2013
Compliance regulations, including those targeting the finance industry, are in place to protect sensitive personal information, right? Apparently some people at the giant, "mega banks" didn’t get ...
- May 30, 2013
As BYOD continues to proliferate in the workplace, mobile device security remains a top IT priority, according to a recent SearchCompliance survey.