Articles
It seems like every week there’s another data breach in the news and the fallout that both the company and its customers experience is front and center. Meanwhile, as organizations continues to digitize sensitive data, they assume ever-greater risks with the storage and processing of that information.
Continue reading...
The latest figures from the Ponemon Institute and IBM 2015 Cost of Data Breach Study show an ongoing increase in the cost of a data breach.
For companies that participated in the study, the number rose to $3.79 million. And that’s just the tangible cost.
Continue reading...
In the age of enterprise social networks and cloud-based collaboration platforms, almost every employee is a content contributor. And while this helps provide new insights and perspectives throughout your business, the influx of content brings about new risks.
Continue reading...
Forces are pushing multiple business departments to be more agile in their day to day operations, and internal audit is no exception.
Faced with an ever-changing list of risks, internal audit is tasked with becoming more nimble, more strategic and more data-driven.
Continue reading...
Gartner predicted 75 percent of large enterprises would have hybrid cloud deployments by the end of 2015.
Continue reading...
It's time to rethink your browser extensions.
According to researchers at Boston's Northeastern University, nine of the 10 most popular Firefox extensions open the door to security intrusions and malware.
Continue reading...
Until recent years, records management has been a behind-the-scenes operation. Today, driven by the plethora of highly visible data breaches, the exponential growth of digital data, regulatory demands and the need for digital transformation to support insight and intelligence, records management has been thrust into the spotlight.
Continue reading...
The concept of Privacy by Design (PbD) — or building privacy into technology and processes from the start — is nothing new. What is new is that it is now a legal requirement for many organizations.
Privacy by Design is one of the many obligations under the new European Union General Data Protection Regulation (GDPR). And
Continue reading...
A shift is happening in the information management (IM) industry. Ownership of IM disciplines — records management, content management, information governance, etc. — is consolidating under information security at many of our clients.
Continue reading...
With more and more data in use by businesses, their customers and clients, it's increasingly difficult to track, monitor and protect it.
It seems clear from the number of data breaches in the past year alone that information governance is either not the priority or being addressed haphazardly.
Continue reading...
Should Apple let the government break encryption, asks every other e-mail Scott has received this week? The premise behind that question is the product of misinformation.
Continue reading...
So you thought the Cloud was safe?
Continue reading...
Risk does not exist in a vacuum. Considering it as such is a sure path to poor performance.
A Governance Model for Risk ...
Continue reading...
It’s where the black hats, trench coats, double-breasted suits, and Space Invaders T-shirts come together. No, not ComicCon. But it does tend to look that way, doesn’t it?
Continue reading...