- May 17, 2013
Information governance expert Jeffrey Ritter discusses how technology for e-discovery evolved, and how it influences data processes and management.
- May 16, 2013
In this Product Spotlight, learn about two new security platforms from vendors CipherCloud and MetricStream.
- May 14, 2013
Twitter was abuzz after a report of possible updates to wiretapping laws. Opponents argue it would dramatically alter civil rights and online privacy.
- May 02, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) By now, everyone in the world of information management is aware of the staggering increases in ...
- April 22, 2013
Social media has been buzzing of late about the House passage of CISPA, as opponents argue the cybersecurity bill is a huge hit to consumer privacy.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- April 22, 2013
In this Product Spotlight, learn about two global compliance services created to boost mobile productivity and enforce compliance for on-the-go employees.
- April 15, 2013
(This blog post was written by Marilyn Bier, chief executive officer of ARMA International.) Organizations depend on information to manage day-to-day operations, comply with regulations, gauge ...
- April 04, 2013
The global economy creates unique risks and regulatory compliance rules for multinational corporations, forcing them to re-examine GRC processes.
- April 01, 2013
Ace Hardware Director of Risk Management William J. Montanez discusses the key aspects of, and obstacles to, a strategy for managing corporate risk.
- March 22, 2013
Microsoft this week became the latest big-name U.S. company to be investigated for bribing foreign officials and violating the Foreign Corrupt Practices Act. The U.S. Department of Justice and the ...
- March 14, 2013
President Obama met with high-profile business leaders this week to discuss how the private sector can work together on U.S. cybersecurity strategy.
- March 08, 2013
In this Product Spotlight, learn about new compliance monitoring tools to help financial institutions meet regulatory and data reporting requirements.
- February 22, 2013
U.S. cybersecurity -- or the lack of it -- was big news this week, as President Barack Obama's recent issuance of cybersecurity-related executive orders coincided with reports that China has ...
- February 18, 2013
In this Product Spotlight, learn how new DR/BC offerings from RSA and Continuum could benefit business priorities and compliance managers' strategies.
- January 31, 2013
One analysis found an uptick in breaches in 2012, but simple, organization-wide controls could be the key to maintaining data security and privacy.