Data Security

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog

Toxic Data and DLP: Value or a Waste?

In a Forrester white paper, they referred to ‘toxic data’, which I thought was a very powerful use of words, in reference to deploying DLP technology. With the recent announcement of DLP availability in Office 365 the white paper piqued my interest.…

Read More

The mind of a hacker

In my previous blog about the commonality of passwords, a companion article addressed glimpses into a hackers mind. The survey, conducted by Thycotic included the following results.

  • 51% do it for fun
  • 19% do it for financial gain
  • 29% feel they are a moral compass
  • 1% do it for notoriety
  • 86% are not worried about getting caught

Who would they target first?…

Read More

Information Governance – Sweeping the Country? What country?

We recently sponsored the AIIM, “Automating Information Governance – Assuring Compliance” white paper, and some of the statistics uncovered are insightful in regards to Information Governance.…

Read More

Using a Taxonomy to Improve Records Management

Since I seem to be on a compliance kick this week, I found the following quote quite insightful.

“More than 100,000 international laws and regulations are potentially relevant to Forbes Global 1000 companies—ranging from financial disclosure requirements to standards for data retention and privacy.

Read More

Is your organization a digital hoarder?

I am always appalled when I somehow get roped into watching a show on a hoarder. I do realize it is a sickness, but it always amazes me that people can live like that. But, on the other hand, I think my husband has the beginning of the disease as he saves everything ‘just in case’ he will need it (think a street sewer cover!).…

Read More

The Three Monthly Questions to Ask, and Answer, About Your SharePoint Data Security

CipherPoint is a partner of Concept Searching. This blog is well worth the read and provides value to any SharePoint organization concerned with security.

The following blog was posted on the CipherPoint web site.

Read More

Building a House for Information Governance

I’ve noticed that from an unstructured and semi-structured perspective that many SharePoint organizations don’t really see the big picture of Information Governance. But they sure know it from the tactical level.…

Read More

Concept Searching Welcomes Mabe as a New Client

Concept Searching is pleased to announce that Mabe, the world’s largest manufacturer of gas appliances and manufacturer of 90% of all gas appliances sold in the US under the GE brands will be deploying conceptClassifier for SharePoint.…

Read More

Throwing Security Over the Wall

Although it’s common knowledge that most cloud vendors do not accept responsibility of your data – you do. The Amazon AWS web services terms of service stipulate that the cloud vendor doesn’t accept liability for lost or altered data, and that customers are responsible for “taking your own steps to maintain appropriate security, protection and backup of Your Content, which may include the use of encryption technology to protect Your Content from unauthorized access and routine archiving Your Content.”

Ok, let’s assume the cloud vendor gets attacked by the ‘next generation of malware’ (like Flame) or just plain old gets compromised.…

Read More

Protecting Unstructured Content from Exposure

SecurityCorporate risk is increasingly becoming a priority for senior management. The demarcation of who is responsible for the protection of data is becoming blurred. It can no longer be the responsibility of one person, and must encompass all stakeholders and end users to identify and secure privacy assets to protect an organization.…

Read More
Next Page »

Search Webinar