Risk News & Analysis
| Thursday May 29, 2014
Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.
But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"
What if your information is not governed properly?
New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.
| Wednesday May 28, 2014
Two more cities are capitalizing on advanced analytics and big data technology to manage their transportation, water and emergency services. IBM announced today that Minneapolis, Minn. and Montpellier, France have both signed up for its Smarter Cities program.
The initiatives include cloud-based management centers that bring together IBM’s portfolio of Intelligent Operations software and IBM Global Business Services expertise.
| Tuesday May 27, 2014
If you've been at an organization where compliance, IT and the business seem to speak different languages when they talk about information management, you know how difficult it is to get them all on the same page. The task is so difficult at most organizations that each typically does their own work -- blinders on -- in isolation from one or both of the other two in an effort to simply get something done. The results for the organization range from less than optimal (wasted time and money) to disastrous (smoking crater fines/penalties and massive operational disruptions).
When working with clients, I liken this state of affairs to whatever the political debate du jour is on the news -- where both sides are seemingly speaking different languages and there’s no agreement on the common ground.
| Friday May 16, 2014
No matter which way you look at it, the Internet of Things (IoT) still has a very long way to go. In fact, if you take a step back and look at it without all of the vendor hype, it's not even entirely clear what exactly it's going to look like.
The Pew Research Center has tried to remedy that with recent research, interviewing more than 1,600 experts about their visions for the IoT. The result is a fascinating look into not just the shape and form it will take, but also some considerable insight into what technology we will be using in the future. Google Glass, it seems, is only the beginning.
| Tuesday May 13, 2014
For passing the buck, there's nothing quite like information governance. It's an IT space in which everyone gets to blame everyone else and no one has to take responsibility for errors. The heart of the problem, Gartner says, is that it is difficult to measure and locate accountability and responsibility.
But this traditional view of governance is changing. As organizations digitize their customer relationships, the way information is synchronized and shared with trading partners is becoming a core business responsibility.
And these three vendors excel.
| Wednesday May 7, 2014
Only two days after Target CEO Gregg Steinhafel was forced to resign amid fallout from a massive cyber attack, French telecommunications giant Orange admitted that hackers have stolen the personal data of 1.3 million customers.
According to Orange, the attack took place last month and resulted in the theft of large amounts of personal data including telephone numbers, birth dates and email addresses.
Orange claims no credit or debit card information was compromised.
| Tuesday May 6, 2014
The cost of security breaches are staggering. Just ask former Target President and CEO Gregg Steinhafel, who was just given the boot following a massive security breach last December. The board of directors, it seems, wants a new face to restore consumer confidence.
It’s probably just a coincidence, but news broke last night that IBM was releasing new security software and services. It also comes as the Ponemon Institute released research that shows the cost of data breaches increased 15 percent in the past year to $3.5 million or an average of $145 per record breached.
| Monday Apr 7, 2014
Very soon, your organization is going to be moving a large amount of content to the cloud, for financial reasons if nothing else. That can be especially tricky when the content involves email, which brings its own set of headaches.
Metalogix says it can ease your pain with its recently released Email Migrator 3.0, which enables organizations migrate mailboxes to another Exchange server or Office 365.
| Thursday Apr 3, 2014
Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.
| Wednesday Mar 26, 2014
Most organizations see collaboration as crucial to their success, but nearly two-thirds of those organizations feel confused about the dovetailing of collaboration and social tools.
And while document and content sharing outside the firewall is considered a necessary evil, many onsite systems have been secured against access to outside systems, forcing business workers to rely on unsecured file sharing systems.
These results and more from recent AIIM research points to a C-Suite that favors collaboration, but puts many obstacles in the way to achieving it.
| Thursday Mar 13, 2014
Many businesses claim they have been busy over the past two years developing and implementing records and information management strategies. But scratch the surface and you find many of those strategies aren't especially effective.
Blame a lack of employee engagement, a lack of commitment at the management level and the absence of meaningful ways to measure the strengths and weaknesses of these efforts.
| Wednesday Feb 26, 2014
In the wake of last week’s announcement that IBM and AT&T are getting together to support the development of the Internet of Things (IoT), many have expressed concerns about IoT and security. It seems, though, that both companies anticipated this and have announced plans to develop simplified, single-source network security products.
| Tuesday Feb 18, 2014
The $19 trillion Internet of Things (IoT) may be closer than you think. Two of the world's biggest companies -- IBM and AT&T -- just entered into a global alliance to develop solutions to support the IoT.
According to a joint statement from the two US giants, the companies are combining their analytic platforms, cloud and security technologies "with privacy in mind" to gain more insights on data collected from machines in a variety of industries.
The alliance will focus on creating new solutions initially targeted for city governments and midsize utilities — organizations that intend to integrate and analyze vast quantities of data from assets such as mass transit vehicles, utility meters and video cameras, Mobeen Khan, executive director of Mobility Marketing at AT&T Business wrote in a blog post.
| Friday Feb 14, 2014
Fie sharing is making inroads into the enterprise content management (ECM) market as business users look for easier ways to shunt content around the enterprise. But recent research shows even the file sharing market is evolving with many users now looking for hybrid cloud/on-premises solutions, as opposed to the pure cloud-based approach.
In effect, many online file sharing (OFS) users are now looking for ways to store at least some of their data on-premises as an alternative to storing that data in third-party data centers, reversing the current trend to move everything to the cloud.
| Wednesday Feb 12, 2014
Microsoft appears to be getting jumpy about the security of Office 365 and Yammer. That is not to say that there have been any recent events to make users nervous.
It’s just that over the past two days, Microsoft has announced the introduction of multi-factor authentication for Office 365, including security enhancements for those using Yammer in SharePoint.