HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Grc News & Analysis

We're All In This Together: Share Your Cybercrime Stories

2015-27-March-horses-talking.jpg

What's the best defense against cybercrime? Surprisingly, it might be a big mouth.

Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.

Think of what's happened in just the past few days. Congress has moved forward legislation that would encourage information-sharing in the financial sector. The retail industry has introduced a portal for this same purpose. And a security company has introduced a new product that uses shared information as its base.

It is quite the turnaround from a few years ago when such information was carefully hoarded. Back then, if an attack occurred, it was only reluctantly shared with customers and competitors.

You Can't Create Digital Businesses Without E-Signatures

Two converging trends — the growth of the mobile workforce and digital business processes — are giving a big boost to the e-signature market.

That's the word from Michael Laurie, co-founder and VP of product strategy at Silanis, an electronic signature provider.

"Acceptance for e-signatures has been growing over the past years in terms of end user adoption," he said, noting that customer experience is a priority. If users don't like an e-signature solution, they won't use it, he said.

The Continued Failure of Risk Management Practices

Risk management is not about avoiding failure -- it is about achieving success.

The ERM Initiative at North Carolina State University, led by Mark Beasley, has published itssixth report on the state of risk management. I saw the first report in 2010 and frankly, not much has changed.

Can the Internet of Things Help You Connect to Higher Profits?

2015-26-february-all-connected

Businesses that embrace the Internet of Things (IoT) will be up to 10 percent more profitable by 2025, according to a new study from Verizon (registration required).

Before you rush to make new connections, consider the obvious.Verizon has a vested interest in promoting the IoT.In 2014, the company saw a 45 percent year-over-year revenue growthin its own IoT business — which translated to about$585 million of its $88 billionin revenue in 2014.

Still, the research is interesting.

Verizon, using proprietary data and results of commissioned studies from ABI Research, estimates there were 1.2 billion different devices connected to the Internet last year and that the number will rise to 5.4 billion by 2020 for an annual growth rate of 28 percent.

So how can you tap in to boost your bottom line?

Blame the C-Suite for Your Failed SharePoint Project

2015-26-february-where-did-it-go.jpg

About two out of three organizations complain their SharePoint projects have stalled (26 percent) or failed to live up to their expectations (37 percent).

And it gets worse, according to new AIIM research.

A majority of respondents blame those SharePoint failures on lack of support from senior management.

Keeping SharePoint In Check with Information Governance

Historically, SharePoint was thought to cause as many information governance problems as it solved. The 2001 to 2003 versions did not show Microsoft putting much effort into helping customers with information governance. But after the massive take up of SharePoint Portal Server 2007 licenses, and the often negative conversations coming out of the sizable SharePoint user community, Microsoft started to take governance issues seriously. Governance-focused sessions started popping up at the conferences, and governance articles and check lists made an appearance on TechNet.

'Managing Chaos': The Long, Winding Road to Digital Governance

2015-19-February-Stairwell.jpg

Governance is a lot of different things to a lot of different people. For records managers it's all about metadata. For C-level managers it's a way of preventing lawsuits. For others it's an organizational straitjacket.

This week Lisa Welchman published her much anticipated book on digital governance, "Managing Chaos." Welchman is a recognized expert in the digital governance field and president of Digital Governance Frameworks at ActiveStandards.I could't wait to read this book. And (spoiler alert) -- I was not disappointed.

Amazon Muscles Deeper into the Enterprise Space

Amazon Web Services has introduced several upgrades aimed at moving it deeper into the enterprise space.

Its identity and access management (IAM) upgrades, for instance, make it easier for enterprise users and, specifically, systems administrators, to manage and change identities and security settings.

Jeff Barr, Chief Evangelist for Amazon Web Services, explained In ablog postthat the upgrade enhances longstanding IAM features, which until now been associated with single users and the identities they governed.

Microsoft Adds 4 Security Measures to Office 365

Microsoft has added four security measures to Office 365 to help businesses keep their data secure.Two of the measures are focused on compliance and the other two offer better identity protection.

Are four new measures at once a bit much? Not if you consider things like the recentAnthem breach.

Microsoft’s drive to ensure Office 365 security and compliance is nothing new. But with the number of high profile information breaches growing, everyone responsible for enterprise data is a bit edgy.

Are E-Signatures the Missing Links in Paperless Offices?

2015-17-february-fox-writing-with-quill-pen.jpg

The paperless office isstill a dream.

While there are plenty of possible reasons, the most likely involve a combination of technology and management — and, some claim, the failure of even organizations with enterprise content management (ECM) in place to adopt an e-signature strategy.

The problem is not a lack of available e-signature solutions, but the failure of C-Suite executives, including Chief Information Officers, to deploy or develop IT strategies that include digital signatures because of security and legal concerns.

Fed Cybersecurity Summit: Assessing Risks, Looking for Solutions

Here’s something to think about the next time your team crafts an email marketing message. "About two thirds of cyber attacks start with an email," said Patrick Peterson, founder and CEO of San Mateo, Calif.-based Agari, a security solutions provider.

Email is the foundation of digital, added Agari CMO Kevin Cochrane. "And the more we go digital, the more we put ourselves at risk. I think people are just realizing. It's a problem that needs fixing — now," Cochrane said.

In a conversation with CMSWire today from the first ever White House Summit on Cybersecurity and Consumer Protection on the Stanford University campus, Peterson and Cochrane said it was time to acknowledge the potential risks of the Digital Age.

While Peterson cautioned that there was no reason to panic about the growing threats of cybercrime, he stressed that it was time to face facts, accept reality and "be mindful" about potential dangers.

"In a digital, connected world full of stronger and stronger adversaries, the risks are extreme," he said. One of the biggest risks, he added, is a collective loss of trust in the digital economy.

Better Safe than Sorry: Protecting Online Identity

Anyone who's made a purchase -- whether in-store or online -- within the last few years knows that providing an email address has become a standard part of doing business in the United States.

The 2 Irresistible Forces of Enterprise Mobility

2015-5-february-blue-angel1.jpg

“What happens when an irresistible force meets an immovable object?”I was a teenager when I first heard this question. It was an interesting thought exercise at the time, but the practical application in business is more about two forces that go in different directions. For an example, look no farther than when an IT leader sees things differently than a business leader.

Embrace and Embody Risk Management

If a CEO wants his organization to realize the opportunity presented by risk management to deliver better decisions and, through them, improved performance, he needs to do more than “walk the talk.”

I have come up with the phrase “embrace and embody” risk management. (Feel free to borrow it.)

The Yammer vs. SharePoint Governance Taste Test

2015-02-February-Coffee-Coffee.jpgDo you remember the Folgers Crystals instant coffee commercials from the 1980s? In these 30-second advertisements, a surreptitious survey is taken of diners in a fancy and presumably expensive restaurant. Served after-dinner coffee, they inevitably describe for the camera how fantastic it tastes and smells. Just as inevitably, the shock of the coffee drinkers when they discovered they’d actually been served Folgers Crystals -- instant coffee, not the freshly-brewed European blends they’d been expecting -- gave their snobbish expectations the lie.

In many ways the governance of Yammer vis--vis the high-powered governance features of SharePoint is similar to that cup of Folgers coffee versus flavor expected of the freshly-brewed premium blends.

Displaying 16-30 of 373 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >