Risk News & Analysis
| Tuesday Nov 25, 2014
Microsoft may be making a lot of noise about additional security features in Office 365, but Google has been working away behind the scenes too, if perhaps in a less vocal way. Yesterday, it launched the Devices and Activity dashboard, which monitors Google accounts on enterprise devices.
The new dashboard provides IT administrators a way of monitoring who has been accessing what accounts, where and why, but adds an underlying current to the security discussion that's becoming increasingly important in enterprises: responsibility.
| Tuesday Oct 28, 2014
Microsoft continues to weave the web around Office 365 tighter and tighter.
Over the past few months it has added more and more functionality to Office 365 and expanded its reach across and even beyond the enterprise. It is now adding additional security to keep enterprise data safe.
Microsoft introduced new compliance features last week. This week it is extending Data Loss Prevention functionality across the entire Office 365 product.
| Tuesday Oct 7, 2014
The cyberattack on JPMorgan Chase has affected 76 million household accounts, a far larger number than originally expected. The inroads hackers made into the bank has rattled the tech and financial community, to say nothing of Capitol Hill, where legislators are looking anew at cybersecurity legislation.
The reason for their nervousness is clear: JPMorgan Chase is probably one of the most protected institutions in the world. If hackers can successfully breach its security, what chance do other companies stand?
It's a sobering question and there is no pat response other than to treat the event as a wake up call: if a company or industry is perceived to have a rich treasure trove of data within its systems, know that it's fair game to hackers.
And what contains more rich, personalized data than customer relationship management (CRM) systems?
| Friday Oct 3, 2014
It’s all over the morning news. Late yesterday, in a filing with the US Securities and Exchange Commission, JPMorgan Chase revealed that more than half of American households were affected by last summer’s data breach at the bank.
We’re talking about 76 million personal and 10 million business accounts from which “user contact information – name, address, phone number and email address – and internal JPMorgan Chase information relating to such users have been compromised,”according to the New York Times.
It is reportedly the biggest such intrusion ever.
| Thursday Sep 18, 2014
SharePoint stakeholders can't know their risks without knowing their requirements.
And they can't know their risks without knowing the potentially adverse effects of those risks.
Bill English, 11-consecutive SharePoint MVP winner, champions these thoughts. Knowing your risks and potential outcomes can lead to strong governance and compliance.
And as English told an audience here today at the SharePoint Technology Conference at the Boston Park Plaza hotel, "Governance is the enforcement of compliance."
| Tuesday Sep 16, 2014
Many enterprises are investing in costly enterprise content management (ECM) systems without knowing why or even how they will be used.
On the sidelines of the Gartner Portals, Content and Collaboration summit in London yesterday, Kenneth Chin, Gartner research vice president for ECM, explained that many enterprises have yet to develop strategies around their ECM deployments. He also outlined 12 considerations that enterprises should consider to make their ECM deployments successful.
| Thursday Sep 11, 2014
Around five million Gmail usernames and passwords were published late Tuesday on a Russian bitcoin forum. But Google has told account holders not to worry.
According to a post on Google’s online security blog, only 2 percent of the usernames and passwords might have actually worked, and Google’s automatic anti-hijacking systems would have blocked many of those login attempts.
| Thursday Aug 28, 2014
Microsoft has taken another step to secure data in SharePoint Online with the introduction of Data Loss Prevention (DLP). The only thing surprising is that it has taken this long to do it, given that Microsoft already provides DLP for Exchange, Outlook and Outlook Web App (OWA).
However, it wouldn’t make a lot of sense to introduce DLP to SharePoint Online without also applying it to OneDrive.
So Microsoft has gone ahead and done that, too. With it, users will be able to to search for sensitive content in the enterprise eDiscovery Center, but keep the content where it was originally located.
| Thursday Aug 21, 2014
Google is attempting to sink information pirates by processing more than one million takedown requests every day. The number of Digital Millennium Copyright Act (DMCA), requests has rocketed since Google started making the information public and looks set to grow for the rest of the year.
In the last week alone, according to figures that appeared on Google’s Transparency Report today, Google received 7.8 million requests, up 10 percent from the previous week.
| Tuesday Aug 12, 2014
Hot on the heels of the CrossIdeas acquisition two weeks ago, IBM plans to buy the business operations of Lighthouse Security Group (LSG), again for an undisclosed sum.
LSG and CrossIdeas will be integrated with IBM’s existing identity and access management offering to provide a full suite of software that will protect and manage users’ identity.
| Thursday Jul 31, 2014
IBM seems hungry for acquisitions, even though its revenues are down two percent on the year. The latest buy comes in the shape of CrossIdeas, a Rome, Italy-based cyber security vendor.
Financial details of the deal were not disclosed, which means Big Blue probably got it relatively cheap. It also underlines IBM’s growing strength in the security space after it took third position as the biggest security vendor globally after Symantec and McAfee, pushing Trend Micros into fourth place.
| Thursday May 29, 2014
Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.
But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"
What if your information is not governed properly?
New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.
| Wednesday May 28, 2014
Two more cities are capitalizing on advanced analytics and big data technology to manage their transportation, water and emergency services. IBM announced today that Minneapolis, Minn. and Montpellier, France have both signed up for its Smarter Cities program.
The initiatives include cloud-based management centers that bring together IBM’s portfolio of Intelligent Operations software and IBM Global Business Services expertise.
| Tuesday May 27, 2014
If you've been at an organization where compliance, IT and the business seem to speak different languages when they talk about information management, you know how difficult it is to get them all on the same page. The task is so difficult at most organizations that each typically does their own work -- blinders on -- in isolation from one or both of the other two in an effort to simply get something done. The results for the organization range from less than optimal (wasted time and money) to disastrous (smoking crater fines/penalties and massive operational disruptions).
When working with clients, I liken this state of affairs to whatever the political debate du jour is on the news -- where both sides are seemingly speaking different languages and there’s no agreement on the common ground.
| Friday May 16, 2014
No matter which way you look at it, the Internet of Things (IoT) still has a very long way to go. In fact, if you take a step back and look at it without all of the vendor hype, it's not even entirely clear what exactly it's going to look like.
The Pew Research Center has tried to remedy that with recent research, interviewing more than 1,600 experts about their visions for the IoT. The result is a fascinating look into not just the shape and form it will take, but also some considerable insight into what technology we will be using in the future. Google Glass, it seems, is only the beginning.