Search

1 to 10 of 84
Sort by

Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

Why Prepare? The average total organizational cost of a data breach in the United States in 2015 was $6.8 million. [1] In 2016 alone, over 3,000 publicly disclosed data breaches have occurred so far, representing more than 2.2 billion compromised records. [2] In addition to the upfront...

Megan Mohrmann's profile image

Blog Entry
Upcoming Changes in International Data Retention Legislation

For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...

Megan Mohrmann's profile image

Blog Entry
The 2015 Enterprise Flight Path – Will Microsoft Ignite or Combust in the Cloud?

Hey You ... With the Cloud in Your Eyes A little over a month from now the partisan faithful will gather under a sprawling Microsoft tent in Chicago and high-five to the pulsing thump of post enterprise Microsoft -- a mighty convergence of comforting office apps served over slick interfaces...


Blog Entry
BOX ANNOUNCES ENTERPRISE KEY MANAGEMENT

On February 10, 2015 Box announced the beta for Enterprise Key Management. Here's my take on it and what it could mean for organizations ... https://christianpwalker.wordpress.com/2015/02/10/box-ekm/ #Security #EIM #box #cloud


Blog Entry
You're Out of Your Mind

You’re out of yourmind if you think blocking access to file sharing services is filling asecurity gap. You’re out of your mind if you think making people jump throughhoops like Citrix and VPNs to get at content is secure. You’re out of your mindif you think putting stuff in the cloud is...

Chris Walker's profile image

Blog Entry
Approaching Security and Privacy in Mobile-Empowered Businesses in Australia

Over the last few years, mass adoption of mobile devices at workplace has become one of the most dominant trends in Australian businesses. Considering the turbulent adoption rates in both personal and business settings, it is unsurprising that organizations saw both internal and external...

Goran Bogunovic's profile image

Blog Entry
Toxic Data and DLP: Value or a Waste? By Martin Garland

In a Forrester white paper, they referred to ‘toxic data’, which I thought was a very powerful use of words, in reference to deploying DLP technology. With the recent announcement of DLP availability in Office 365 the white paper piqued my interest. What I thought was interesting,...

Cate Evans's profile image

Blog Entry
Uncovering Office 365, SharePoint Online and My Data

Overview of Office 365, SharePoint Online and My Data A major area of concern about Office 365 is the lack of understanding about how and where the data itself is stored and what proactive measures are being taken to ensure that your data is safe. As part of our research and our ongoing...

Errin O'Connor's profile image

Blog Entry
Security Governance Best Practices for SharePoint 2013 & Office 365 | SharePoint Online

Security Governance Best Practices for SharePoint 2013 & Office 365 | SharePoint Online EPC Group understands that security has never been a hotter topic in IT, but in most cases, even though it is being discussed by members of the organization and dominates a good deal of technology news...

Errin O'Connor's profile image