Risk News & Analysis
| Friday Dec 6, 2013
How about a scare for the weekend? According to internet security firm Trustwave, more than 2 million passwords for social media sites including Facebook and Twitter, as well as passwords for Yahoo and Google, have been hacked and posted online.
| Tuesday Dec 3, 2013
MetaVis just unveiled new capabilities for Office 365 and SharePoint Online that will provide users with tighter administration and governance of their cloud-based content. According to MetaVis, the capabilities fill important holes in Office 365 environments by offering views of everything that happens to content inside those environments.
| Tuesday Nov 12, 2013
Sure the development of the Internet of Things has a way to go before it becomes a reality. But IT research firm Gartner already estimates it will be worth $1.9 trillion by 2020. Gartner also predicts the Internet of Things will create an entire new economy based on interconnectivity of devices.
| Friday Nov 1, 2013
Two shuttered encrypted email service providers are joining forces in the aftermath of the US National Security Agency (NSA) spying scandal. Lavabit and Silent Circle have set up the Dark Mail Alliance to restore privacy to inboxes.
They're developing an open-source tool that could make peer-to-peer, end-to-end encryption a simple add-on for any email service — and they’re hoping major providers like Google and Microsoft will come on board.
| Monday Oct 28, 2013
The so-called Internet of Things? Fugetaboutit ... at least for a while. The Internet of Things refers to a world where everyday physical objects are connected to the Internet and are able to identify themselves to other devices.
According to new research from Forrester, the concept is well developed, but the reality is three to five years away. But the delay is a good thing: it gives marketers a chance to optimize the Internet of Things for customer engagement.
| Thursday Oct 17, 2013
Oracle has announced the release of a massive security patch for Java that addresses at least 51 identified security vulnerabilities. If you think this does not affect you, keep in mind that Oracle says 89 percent of desktops run Java in one form or another.
| Friday Oct 4, 2013
Adobe has confirmed that one of its servers has been hacked. In a statement that appeared on an Adobe blog by Adobe security chief Brad Arkin, the company admits that the attackers removed information on 2.9 million customers, including names, encrypted credit and debit card numbers, card expiration dates, and information relating to customer orders.
| Wednesday May 29, 2013
While the promise of predictive coding is alluring, many questions remain for corporations and law firms: Where does the software end and the importance of workflow begin? Are companies using it successfully? Is the technology well-suited for all types of legal matters?
| Monday Apr 29, 2013
If you've ever wondered where information management and related IT fields are going, or where all the different strands will come together, new research by SAP may have the answer -- Machine to Machine (M2M) technologies across a vastly expanded internet are the next step in information and data management.
| Thursday Apr 18, 2013
Research carried out recently by Voltage Security at the RSA conference in San Francisco has confirmed what most of us know, but many enterprises still have to take action on: the inability to access data is costing enterprises money, and specifically, according to this research, sales.
| Monday Apr 15, 2013
It all starts with a “discovery program framework” -- which is just a glorified checklist. But it’s proven to be one heck of a useful checklist for those organizations who are addressing litigation readiness, compliance and e-Discovery.
| Monday Apr 8, 2013
If internal audit is to remain relevant, it needs to move beyond the services currently performed to provide assurance to the main stakeholders.
| Monday Mar 18, 2013
If you live in the Northeast, odds are that you looked out your window a couple of weeks ago and saw snow falling from the sky. Parts of the region were buried under more than three feet of the white stuff, paralyzing the population. The bright side of any blizzard is that the snow, no matter how much, eventually melts away. The same is not the case for email.
| Monday Mar 11, 2013
Uncertainty is inherent in any plan. But there are actions that can be taken to increase the likelihood of positive outcomes and to reduce risk.
| Monday Mar 4, 2013
For those trying to obtain managerial buy in for security control, the stages in the process can often parallel the five stages of grief: denial, anger, bargaining, depression, acceptance.