- July 24, 2013
Gaping holes in U.S. cybersecurity -- especially vulnerabilities relating to trade secrets -- remain a top concern for the Obama administration as it struggles to get industry on board with digital ...
- July 17, 2013
Is your organization gathering and properly acting upon risk intelligence? Our latest Product Spotlight roundup focuses on risk-centric GRC tools.
- July 11, 2013
The NSA scandal has sparked worldwide talks on cybersecurity regulation as countries hammer out cyberprotection policies to guard digital information.
- July 08, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) It's tempting to hang on to every document and every email message we create and receive because we ...
- June 28, 2013
Opinions abound regarding Edward Snowden and his leak of a secret NSA surveillance program, as U.S. officials increase efforts to extradite him.
Sponsored by DellEMC - Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More
Sponsored by DellEMC - Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More
Sponsored by DellEMC - Every organization in every industry is creating massive volumes of data. The goal of many IT modernization efforts is to ensure that the organization can harness the value of that data to understand powerful insights, increase efficiencies and drive innovations. See More
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
- June 19, 2013
In this SearchCompliance Product Spotlight, learn how new tools from MAM solutions providers can help you manage risk at your organization.
- June 10, 2013
An NSA program's surveillance activities are leading to discussions on online privacy issues and widely varying opinions on where to draw the line.
- June 03, 2013
Facebook's review of its hate speech policy drew much online commentary, with some praising the move while others saying it violates free speech.
- May 31, 2013
Compliance regulations, including those targeting the finance industry, are in place to protect sensitive personal information, right? Apparently some people at the giant, "mega banks" didn’t get ...
- May 30, 2013
As BYOD continues to proliferate in the workplace, mobile device security remains a top IT priority, according to a recent SearchCompliance survey.
- May 17, 2013
Information governance expert Jeffrey Ritter discusses how technology for e-discovery evolved, and how it influences data processes and management.
- May 16, 2013
In this Product Spotlight, learn about two new security platforms from vendors CipherCloud and MetricStream.
- May 14, 2013
Twitter was abuzz after a report of possible updates to wiretapping laws. Opponents argue it would dramatically alter civil rights and online privacy.
- May 02, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) By now, everyone in the world of information management is aware of the staggering increases in ...
- April 22, 2013
Social media has been buzzing of late about the House passage of CISPA, as opponents argue the cybersecurity bill is a huge hit to consumer privacy.