Risk News & Analysis
| Thursday Aug 28, 2014
Microsoft has taken another step to secure data in SharePoint Online with the introduction of Data Loss Prevention (DLP). The only thing surprising is that it has taken this long to do it, given that Microsoft already provides DLP for Exchange, Outlook and Outlook Web App (OWA).
However, it wouldn’t make a lot of sense to introduce DLP to SharePoint Online without also applying it to OneDrive.
So Microsoft has gone ahead and done that, too. With it, users will be able to to search for sensitive content in the enterprise eDiscovery Center, but keep the content where it was originally located.
| Thursday Aug 21, 2014
Google is attempting to sink information pirates by processing more than one million takedown requests every day. The number of Digital Millennium Copyright Act (DMCA), requests has rocketed since Google started making the information public and looks set to grow for the rest of the year.
In the last week alone, according to figures that appeared on Google’s Transparency Report today, Google received 7.8 million requests, up 10 percent from the previous week.
| Tuesday Aug 12, 2014
Hot on the heels of the CrossIdeas acquisition two weeks ago, IBM plans to buy the business operations of Lighthouse Security Group (LSG), again for an undisclosed sum.
LSG and CrossIdeas will be integrated with IBM’s existing identity and access management offering to provide a full suite of software that will protect and manage users’ identity.
| Thursday Jul 31, 2014
IBM seems hungry for acquisitions, even though its revenues are down two percent on the year. The latest buy comes in the shape of CrossIdeas, a Rome, Italy-based cyber security vendor.
Financial details of the deal were not disclosed, which means Big Blue probably got it relatively cheap. It also underlines IBM’s growing strength in the security space after it took third position as the biggest security vendor globally after Symantec and McAfee, pushing Trend Micros into fourth place.
| Thursday May 29, 2014
Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.
But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"
What if your information is not governed properly?
New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.
| Wednesday May 28, 2014
Two more cities are capitalizing on advanced analytics and big data technology to manage their transportation, water and emergency services. IBM announced today that Minneapolis, Minn. and Montpellier, France have both signed up for its Smarter Cities program.
The initiatives include cloud-based management centers that bring together IBM’s portfolio of Intelligent Operations software and IBM Global Business Services expertise.
| Tuesday May 27, 2014
If you've been at an organization where compliance, IT and the business seem to speak different languages when they talk about information management, you know how difficult it is to get them all on the same page. The task is so difficult at most organizations that each typically does their own work -- blinders on -- in isolation from one or both of the other two in an effort to simply get something done. The results for the organization range from less than optimal (wasted time and money) to disastrous (smoking crater fines/penalties and massive operational disruptions).
When working with clients, I liken this state of affairs to whatever the political debate du jour is on the news -- where both sides are seemingly speaking different languages and there’s no agreement on the common ground.
| Friday May 16, 2014
No matter which way you look at it, the Internet of Things (IoT) still has a very long way to go. In fact, if you take a step back and look at it without all of the vendor hype, it's not even entirely clear what exactly it's going to look like.
The Pew Research Center has tried to remedy that with recent research, interviewing more than 1,600 experts about their visions for the IoT. The result is a fascinating look into not just the shape and form it will take, but also some considerable insight into what technology we will be using in the future. Google Glass, it seems, is only the beginning.
| Tuesday May 13, 2014
For passing the buck, there's nothing quite like information governance. It's an IT space in which everyone gets to blame everyone else and no one has to take responsibility for errors. The heart of the problem, Gartner says, is that it is difficult to measure and locate accountability and responsibility.
But this traditional view of governance is changing. As organizations digitize their customer relationships, the way information is synchronized and shared with trading partners is becoming a core business responsibility.
And these three vendors excel.
| Wednesday May 7, 2014
Only two days after Target CEO Gregg Steinhafel was forced to resign amid fallout from a massive cyber attack, French telecommunications giant Orange admitted that hackers have stolen the personal data of 1.3 million customers.
According to Orange, the attack took place last month and resulted in the theft of large amounts of personal data including telephone numbers, birth dates and email addresses.
Orange claims no credit or debit card information was compromised.
| Tuesday May 6, 2014
The cost of security breaches are staggering. Just ask former Target President and CEO Gregg Steinhafel, who was just given the boot following a massive security breach last December. The board of directors, it seems, wants a new face to restore consumer confidence.
It’s probably just a coincidence, but news broke last night that IBM was releasing new security software and services. It also comes as the Ponemon Institute released research that shows the cost of data breaches increased 15 percent in the past year to $3.5 million or an average of $145 per record breached.
| Monday Apr 7, 2014
Very soon, your organization is going to be moving a large amount of content to the cloud, for financial reasons if nothing else. That can be especially tricky when the content involves email, which brings its own set of headaches.
Metalogix says it can ease your pain with its recently released Email Migrator 3.0, which enables organizations migrate mailboxes to another Exchange server or Office 365.
| Thursday Apr 3, 2014
Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.
| Wednesday Mar 26, 2014
Most organizations see collaboration as crucial to their success, but nearly two-thirds of those organizations feel confused about the dovetailing of collaboration and social tools.
And while document and content sharing outside the firewall is considered a necessary evil, many onsite systems have been secured against access to outside systems, forcing business workers to rely on unsecured file sharing systems.
These results and more from recent AIIM research points to a C-Suite that favors collaboration, but puts many obstacles in the way to achieving it.
| Thursday Mar 13, 2014
Many businesses claim they have been busy over the past two years developing and implementing records and information management strategies. But scratch the surface and you find many of those strategies aren't especially effective.
Blame a lack of employee engagement, a lack of commitment at the management level and the absence of meaningful ways to measure the strengths and weaknesses of these efforts.