Search

1 to 10 of 33
Sort by

Blog Entry
You're Out of Your Mind

You’re out of yourmind if you think blocking access to file sharing services is filling asecurity gap. You’re out of your mind if you think making people jump throughhoops like Citrix and VPNs to get at content is secure. You’re out of your mindif you think putting stuff in the cloud is...

Chris Walker's profile image

Blog Entry
Information Governance Is

Over the last few weeks some pretty bright minds have been talking / writing about what Information Governance (IG) is and isn’t. Unfortunately, I couldn’t find the restraint to stay out of it. To get some of the background of what’s been going on, read a few posts from these...

Chris Walker's profile image

Blog Entry
SharePoint 2013 BYOD Best Practices

Introduction (BYOD | MDM) Remote workers and internal or onsite workers empowered with “ bring your own device ” (BYOD) policies can push the boundaries of IT and the typical IT-driven culture. A lot of IT organizations are playing catch-up around governance and their information...

Errin O'Connor's profile image

Blog Entry
When Information Becomes a Liability

A while back I wrote a couple of posts ( one and two ) about attempting to value information as an asset, carried on the balance sheet. I took a very accounting oriented approach, and I think I’ve made some progress. This post follows, after a fashion, those two previous posts. ...

Chris Walker's profile image

Blog Entry
Risk Analysis and Legacy Data: How to make your Big Data Defensible

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the...

Johannes Scholtes's profile image

Blog Entry
A Simple Model for Information Governance, Part 3 of 3

Introduction In the previous installments (January 17 and January 26, 2014), I discussed my difficulties with the current definitions of “Information Governance,” a hierarchical view of Governance and Management, and the nature of the activities at each level. This installment looks...

Christian Liipfert's profile image


Blog Entry
30 years ZyLAB!

Today, we celebrate our corporate 30 th anniversary, another milestone in the rich history of our company. Incorporated on September 2 nd , 1983 in Chicago, Illinois to develop the first full-text search program for the PC-platform: ZyINDEX. In those days, ZyINDEX was a very popular software...

Johannes Scholtes's profile image

Blog Entry
Book of PHIGs - Introduction Draft

A while back I mentioned that I was going to try to write a book . Well, I’ve started it at last. Between losing my job and spending time at the cabin I’ve not really been motivated or focused. I’ve been spending my time looking for work, but also enjoying rural life at my...

Chris Walker's profile image

Blog Entry
Ensuring Compliance: Information Types Your Organization Should Be Concerned About

This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance. (Note: This is part of our series “Collaborate with Confidence”. Previous posts: Assessing Risk: Is Your Compliance Plan up to the Test? ) Information placed on the...

Matthew Bretzius's profile image