HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk News & Analysis

Microsoft Secures SharePoint Online Data

2014-28-august-man-secured-with-rope.jpg

Microsoft has taken another step to secure data in SharePoint Online with the introduction of Data Loss Prevention (DLP). The only thing surprising is that it has taken this long to do it, given that Microsoft already provides DLP for Exchange, Outlook and Outlook Web App (OWA).

However, it wouldn’t make a lot of sense to introduce DLP to SharePoint Online without also applying it to OneDrive.

So Microsoft has gone ahead and done that, too.  With it, users will be able to to search for sensitive content in the enterprise eDiscovery Center, but keep the content where it was originally located.

Google Dealing With 1M Data Takedown Requests Daily

2014-21-august-pirate

Google is attempting to sink information pirates by processing more than one million takedown requests every day. The number of Digital Millennium Copyright Act (DMCA), requests has rocketed since Google started making the information public and looks set to grow for the rest of the year.

In the last week alone, according to figures that appeared on Google’s Transparency Report today, Google received 7.8 million requests, up 10 percent from the previous week.

IBM Focuses on Security Again With Lighthouse Buy

2014-08-12 IBM Identity Access Management.jpg

Hot on the heels of the CrossIdeas acquisition two weeks ago, IBM plans to buy the business operations of Lighthouse Security Group (LSG), again for an undisclosed sum.

LSG and CrossIdeas will be integrated with IBM’s existing identity and access management offering to provide a full suite of software that will protect and manage users’ identity.

CrossIdeas Acqusition Underlines IBM's Security Drive

2014-31-July-crossideas.jpg

IBM seems hungry for acquisitions, even though its revenues are down two percent on the year. The latest buy comes in the shape of CrossIdeas, a Rome, Italy-based cyber security vendor.

Financial details of the deal were not disclosed, which means Big Blue probably got it relatively cheap. It also underlines IBM’s growing strength in the security space after it took third position as the biggest security vendor globally after Symantec and McAfee, pushing Trend Micros into fourth place.

Is NSA Leaker Edward Snowden the Info Governance Champ?

AIIM information governance in the enterprise 320 x 240.jpg Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.

But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"

What if your information is not governed properly?

New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.

2 Cities in US, France Join IBM Smarter Cities Initiative

Montpellier smart city.jpg

Two more cities are capitalizing on advanced analytics and big data technology to manage their transportation, water and emergency services. IBM announced today that Minneapolis, Minn. and Montpellier, France have both signed up for its Smarter Cities program.

The initiatives include cloud-based management centers that bring together IBM’s portfolio of Intelligent Operations software and IBM Global Business Services expertise.

Finding Common Ground with Information Governance

2014-27-May-Joint-Meeting.jpgIf you've been at an organization where compliance, IT and the business seem to speak different languages when they talk about information management, you know how difficult it is to get them all on the same page. The task is so difficult at most organizations that each typically does their own work -- blinders on -- in isolation from one or both of the other two in an effort to simply get something done. The results for the organization range from less than optimal (wasted time and money) to disastrous (smoking crater fines/penalties and massive operational disruptions).

When working with clients, I liken this state of affairs to whatever the political debate du jour is on the news -- where both sides are seemingly speaking different languages and there’s no agreement on the common ground.

6 Things to Know About the Internet of Things

Thumbnail image for 2014-16-May-central's station control room in Italy.jpg

No matter which way you look at it, the Internet of Things (IoT) still has a very long way to go. In fact, if you take a step back and look at it without all of the vendor hype, it's not even entirely clear what exactly it's going to look like. 

The Pew Research Center has tried to remedy that with recent research, interviewing more than 1,600 experts about their visions for the IoT. The result is a fascinating look into not just the shape and form it will take, but also some considerable insight into what technology we will be using in the future. Google Glass, it seems, is only the beginning.

3 Vendors that Make Information Governance Cool

2014-13-May-Female photographer with sunglasses.jpg

For passing the buck, there's nothing quite like information governance. It's an IT space in which everyone gets to blame everyone else and no one has to take responsibility for errors. The heart of the problem, Gartner says, is that it is difficult to measure and locate accountability and responsibility. 

But this traditional view of governance is changing. As organizations digitize their customer relationships, the way information is synchronized and shared with trading partners is becoming a core business responsibility. 

And these three vendors excel.

French Telecom Giant Orange Admits Massive Hack

Only two days after Target CEO Gregg Steinhafel was forced to resign amid fallout from a massive cyber attack, French telecommunications giant Orange admitted that hackers have stolen the personal data of 1.3 million customers.

According to Orange, the attack took place last month and resulted in the theft of large amounts of personal data including telephone numbers, birth dates and email addresses.

Orange claims no credit or debit card information was compromised.

Target Breach Creates New Opportunities for IBM

2014-06-May-gregg-steinhafel

The cost of security breaches are staggering. Just ask former Target President and CEO Gregg Steinhafel, who was just given the boot following a massive security breach last December. The board of directors, it seems, wants a new face to restore consumer confidence.

It’s probably just a coincidence, but news broke last night that IBM was releasing new security software and services. It also comes as the Ponemon Institute released research that shows the cost of data breaches increased 15 percent in the past year to $3.5 million or an average of $145 per record breached.

Metalogix Tackles Those Tricky Email Migrations

Metalogix Email Migrator 3.jpg

Very soon, your organization is going to be moving a large amount of content to the cloud, for financial reasons if nothing else. That can be especially tricky when the content involves email, which brings its own set of headaches.

Metalogix says it can ease your pain with its recently released Email Migrator 3.0, which enables organizations migrate mailboxes to another Exchange server or Office 365.

BYOD: Mixing Work and Play While Minimizing Risk

Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.

Enterprise Collaboration Tools a 'Must' For Business Success

AIIM lede.jpgMost organizations see collaboration as crucial to their success, but nearly two-thirds of those organizations feel confused about the dovetailing of collaboration and social tools.

And while document and content sharing outside the firewall is considered a necessary evil, many onsite systems have been secured against access to outside systems, forcing business workers to rely on unsecured file sharing systems.

These results and more from recent AIIM research points to a C-Suite that favors collaboration, but puts many obstacles in the way to achieving it.

Businesses Should Manage Records - Not 'Keep Everything'

paper and more paper.jpg

Many businesses claim they have been busy over the past two years developing and implementing records and information management strategies. But scratch the surface and you find many of those strategies aren't especially effective.

Blame a lack of employee engagement, a lack of commitment at the management level and the absence of meaningful ways to measure the strengths and weaknesses of these efforts.

Displaying 1-15 of 157 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 Next >