- August 15, 2013
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.
- August 08, 2013
In this Product Spotlight, we look at two new risk management assessment tools intended to better secure and protect your organization's private data.
- July 24, 2013
Gaping holes in U.S. cybersecurity -- especially vulnerabilities relating to trade secrets -- remain a top concern for the Obama administration as it struggles to get industry on board with digital ...
- July 17, 2013
Is your organization gathering and properly acting upon risk intelligence? Our latest Product Spotlight roundup focuses on risk-centric GRC tools.
- July 11, 2013
The NSA scandal has sparked worldwide talks on cybersecurity regulation as countries hammer out cyberprotection policies to guard digital information.
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- July 08, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) It's tempting to hang on to every document and every email message we create and receive because we ...
- June 28, 2013
Opinions abound regarding Edward Snowden and his leak of a secret NSA surveillance program, as U.S. officials increase efforts to extradite him.
- June 19, 2013
In this SearchCompliance Product Spotlight, learn how new tools from MAM solutions providers can help you manage risk at your organization.
- June 10, 2013
An NSA program's surveillance activities are leading to discussions on online privacy issues and widely varying opinions on where to draw the line.
- June 03, 2013
Facebook's review of its hate speech policy drew much online commentary, with some praising the move while others saying it violates free speech.
- May 31, 2013
Compliance regulations, including those targeting the finance industry, are in place to protect sensitive personal information, right? Apparently some people at the giant, "mega banks" didn’t get ...
- May 30, 2013
As BYOD continues to proliferate in the workplace, mobile device security remains a top IT priority, according to a recent SearchCompliance survey.
- May 17, 2013
Information governance expert Jeffrey Ritter discusses how technology for e-discovery evolved, and how it influences data processes and management.
- May 16, 2013
In this Product Spotlight, learn about two new security platforms from vendors CipherCloud and MetricStream.
- May 14, 2013
Twitter was abuzz after a report of possible updates to wiretapping laws. Opponents argue it would dramatically alter civil rights and online privacy.