News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Digital Transformation

Is Digital Transformation Really That Hard? No Wonder You Don’t Want to Do It

I have to chuckle, as digital transformation is once again trying to get on executives’ desks, front and center, any desks as long as they belong to those with clout. As an aside, analysts put forward ideas of things we must do, but they don’t necessarily do these things themselves.…

Read More
Digital Transformation - Concept Searching

Digital Transformation – Too Difficult?

Digital transformation is now back in ‘must do’ land – in again, out again. I can only surmise that a few years back none of us were ready.…

Read More
Machine Learning

The Holy Grail for Security – AI and ML? Not so Fast

This is a great article, at least I think so – ‘AI and ML choices can greatly impact data security‘ offers an opinion on the pluses and minuses of using artificial intelligence (AI) and machine learning (ML) to aid in the identification and remediation of security vulnerabilities.…

Read More
Security - Concept Searching

Hackers? Oh, We Have an Open Door Policy

I have often seen recommendations to ‘think like a cybercriminal’ in relation to protecting your organization from data breaches. It appears that this is not happening.…

Read More
ePrivacy Regulation, EPR, EU, ePrivacy Directive

The EU Is at It Again – ePR

The EU is at it again. The ePrivacy Regulation (ePR), which originally should have been finalized on the date of the enforcement of the General Data Protection Regulation GDPR, 25 May 2018, is under review. Its purpose is to specifically protect the confidentiality of electronic communications.…

Read More
Data Breach

The Scariest Breach – Your ‘Trusted’ Partners – Part Two

This is Part Two of a two-part blog, with suggestions from cybersecurity experts on how you can proactively manage the growing problem of third-party data breaches. Read about the risks in Part One of the blog.…

Read More
data breach concept searching - The Scariest Breach – Your ‘Trusted’ Partners – Part One

The Scariest Breach – Your ‘Trusted’ Partners – Part One

This is Part One of a two-part blog on the risks of third-party data breaches. Part Two provides suggestions from cybersecurity experts on how you can proactively manage this growing problem.

Read More
Content Optimization

Hey, You, Get off of My Cloud

In May, Gartner released a report titled “Don’t Let Cloud Migration Flip Your Network and Put Users in Charge of Enterprise Security,” which is a pretty good read, focusing on how the cloud can be detrimental to the overall infrastructure of organizations.…

Read More
Data Privacy - Concept Searching

Forget About Privacy – Where Are the Robotics Specifications?

Since the approach of the General Data Protection Regulation (GDPR), protecting privacy data has been a popular topic. Not that anything too significant has since been done about it, such as all companies complying, governments cracking the whip at poor managers, or even outrage from hapless victims.…

Read More
Collaboration - Records Management

Email and Collaboration Risk for Records Managers

In a previous blog, we explored how the growing need to capture social site content and track it as records is now another layer of complexity that records managers must contend with.…

Read More
Next Page »
Concept Searching