Securing Sensitive HR Information in the Enterprise
Having a secure solution to manage and protect sensitive HR data is critical to reducing the risk associated with the exchange of confidential information. The post Securing Sensitive HR Information in...
View ArticleControlling Content in the Digital Workplace
The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace appeared...
View ArticleThe Data Sovereignty Dilemma of the Digital Workplace
If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...
View ArticleHow can Businesses Evade the Ever Increasing Threat to their Data Security?
Intralinks' CTO EMEA, Richard Anstey, shares the state of corporate information security and best practices for data protection on Information Security Buzz. The post How can Businesses Evade the Ever...
View ArticleThe Challenges of Data Sovereignty in the Cloud
The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...
View ArticleISO 27001 Requirement for Providers: What You Need To Know
Here’s everything you need to know about what ISO 27001 security certification means to your organization and where its data is stored. The post ISO 27001 Requirement for Providers: What You Need To...
View ArticleDid My Computer Security Predictions for 2015 Come True? Find Out Now…
Companies are suffering data breaches and zero-day vulnerabilities are being found. One important decision to make is how your business should share data. The post Did My Computer Security Predictions...
View Article6 Practical Ways to Prepare for Your Next Compliance Exam
Regulatory exams are becoming more complex while preparation time is shrinking. So what's the best way to prepare thoroughly? Here are six practical tips. The post 6 Practical Ways to Prepare for Your...
View Article5 Ways to Sleep Easy Knowing You Can Trust Your Company Data in the Cloud
Here are five data security tips to consider to help your information security and IT teams count sheep and sleep easy with your company data in the cloud. The post 5 Ways to Sleep Easy Knowing You Can...
View ArticleDropbox, Box vulnerable to Man-In-The-Cloud Attack
At last week’s annual Black Hat conference, the security firm Imperva said they’d found a 'side door' vulnerability in several file sync and share apps. The post Dropbox, Box vulnerable to...
View ArticleU.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...
U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleLaw Firms Are Not Immune to Hackers
As we saw from recent news, hacking law firms is not new. This begs the question: How should law firms detect a data breach or prevent one? The post Law Firms Are Not Immune to Hackers appeared first...
View ArticleBecoming a Clinical Trial Investigator: Making Clinical Research Successful...
Dan Sfera, CEO of The Clinical Trials Guru, shares how to start your research clinic and how clinical research can be successful for all parties involved. The post Becoming a Clinical Trial...
View ArticlePrivacy Shield 101: U.S. Companies Face New Rules
If you’re a U.S. company doing business in Europe, what does the Privacy Shield mean for you? Here are the key points. The post Privacy Shield 101: U.S. Companies Face New Rules appeared first on...
View ArticleU.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...
U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....
View ArticleTop GP Concerns About Investor and Portfolio Company Communication, Security,...
A couple of weeks ago I had the opportunity to speak at the Capital Creation Conference in Monaco, hosted by Worldwide Business Research Limited. Three days spent overlooking the clear blue waters of...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleFund Managers Speak Out: Investor Communication, Data Security, and Deal Flow...
Survey findings by Intralinks and Pitchbook reveals fund managers' views on investor communication, information security policies, and deal flow management. The post Fund Managers Speak Out: Investor...
View Article
More Pages to Explore .....