Search

1 to 10 of 87
Sort by

Discussion Post
Reminder - Webinar AIIM True North Mar 25 - We're under attack! Is our data safe?

Reminder that AIIM True North is presenting a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of a data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...


Event
Webinar AIIM True North Mar 25 - We're under attack! Is our data safe?

AIIM True North would like to invite you to a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...

 03-25-2021 | 12:00 - 13:00 ET


Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

Why Prepare? The average total organizational cost of a data breach in the United States in 2015 was $6.8 million. [1] In 2016 alone, over 3,000 publicly disclosed data breaches have occurred so far, representing more than 2.2 billion compromised records. [2] In addition to the upfront...

Megan Mohrmann's profile image

Blog Entry
Upcoming Changes in International Data Retention Legislation

For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...

Megan Mohrmann's profile image

Blog Entry
The 2015 Enterprise Flight Path – Will Microsoft Ignite or Combust in the Cloud?

Hey You ... With the Cloud in Your Eyes A little over a month from now the partisan faithful will gather under a sprawling Microsoft tent in Chicago and high-five to the pulsing thump of post enterprise Microsoft -- a mighty convergence of comforting office apps served over slick interfaces...


Blog Entry
BOX ANNOUNCES ENTERPRISE KEY MANAGEMENT

On February 10, 2015 Box announced the beta for Enterprise Key Management. Here's my take on it and what it could mean for organizations ... https://christianpwalker.wordpress.com/2015/02/10/box-ekm/ #Security #EIM #box #cloud


Blog Entry
You're Out of Your Mind

You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting stuff in the cloud is...

Chris Walker's profile image

Blog Entry
Approaching Security and Privacy in Mobile-Empowered Businesses in Australia

Over the last few years, mass adoption of mobile devices at workplace has become one of the most dominant trends in Australian businesses. Considering the turbulent adoption rates in both personal and business settings, it is unsurprising that organizations saw both internal and external...

Goran Bogunovic's profile image