Information Governance and Data Security - Further Information
This page shows up to 100 pieces of content (newest at the top):
Informatica Data Privacy Management is a datacentric privacy, governance and security solution that is focused on discovering and classifying sensitive data.
Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.
Driving into the future with connected cars - PKI technology helps assuage the security concerns of increased connectivity
PKI technology provides a viable alternative for vastly improving security within today’s increasingly connected cars and the ecosystem in which they operate.
Before a CDO can think sensibly about what data the business might want to leverage they must get a handle on the data assets that the company already possesses.
The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance
This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance
This document discusses how technology enables more effective business collaboration and communications...
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations
Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
The need to protect against file-based attacks - statistical evidence for the need for greater assurance
The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Content assurance and advanced threat protection for valuable business documents - assuring the safety and integrity of files and documents
This document aims to highlight the security risks associated with documents and to show why taking such threats seriously is vital for the success of any organisation.
This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.
Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings
Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.
A series of recently developed technologies will, to a greater or lesser degree, help in combating the effects of the storage explosion.
The strategic importance of email encryption - Securing business data and email traffic throughout its journey
As email is now fully embedded as a business tool and is being used to transfer critical, sensitive data, it is becoming increasingly important to provide a secure, robust and manageable encryption service for email users. Email encryption cannot be…