skip to Main Content

Information Governance and Data Security - Further Information

This page shows up to 100 pieces of content (newest at the top):

Cover for GRC realities - what are organisations really doing?

GRC realities - what are organisations really doing?

Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.
Cover for Driving into the future with connected cars

Driving into the future with connected cars - PKI technology helps assuage the security concerns of increased connectivity

PKI technology provides a viable alternative for vastly improving security within today’s increasingly connected cars and the ecosystem in which they operate.
Cover for The Chief Data Officer: getting the basics right

The Chief Data Officer: getting the basics right

Before a CDO can think sensibly about what data the business might want to leverage they must get a handle on the data assets that the company already possesses.
Cover for The importance of a data protection platform for GDPR compliance

The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance

This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
Cover for How to raise your organisation's security maturity level

How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern

This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
Cover for Practices for Enhancing Data Security

Practices for Enhancing Data Security - a survey of organisations in the UK and the US

This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
Cover for Financial Services Directives

Financial Services Directives - Requirements for Data Technologies

The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
Cover for Document Content Security V2

Document Content Security V2

Preventing malicious documents from traversing networks will help considerably in preventing security breaches.
Cover for Good information governance is good business practice

Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance

This document discusses how technology enables more effective business collaboration and communications...
Cover for Managing Cyber Business Risk

Managing Cyber Business Risk - with Content Assurance and Cyber Insurance

Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Cover for Taking control of file sharing services

Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations

Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
Cover for Document Content Security

Document Content Security

Documents are key weapons used in advanced targeted attacks, which are fast growing in popularity among criminals.
Cover for The need to protect against file-based attacks

The need to protect against file-based attacks - statistical evidence for the need for greater assurance

The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Cover for Content assurance and advanced threat protection for valuable business documents

Content assurance and advanced threat protection for valuable business documents - assuring the safety and integrity of files and documents

This document aims to highlight the security risks associated with documents and to show why taking such threats seriously is vital for the success of any organisation.
post (Icon)

Blended security threats require a unified response

The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec...
Cover for Key considerations for security intelligence in big data

Key considerations for security intelligence in big data - what a CISO needs to know

This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Cover for Harnessing big data for security

Harnessing big data for security - what are the key considerations and capabilities?

This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
post (Icon)

Big Data bias - An analysis of recent research from Varonis

Varonis has published some research into big data - but just looking at the press release is misleading
Cover for Voice Data Security

Voice Data Security

Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.
Cover for Voice Data Security

Voice Data Security - An overview of cellular (mobile) phone interception

Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.
Cover for Efforts to improve data security in the local government sector

Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings

Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.
Cover for Real Evidential Weight

Real Evidential Weight

This white paper discusses data storage in the organisation and it's effective management to meet legislation and compliance.
Cover for Managing the Storage Explosion

Managing the Storage Explosion - through new technological approaches

A series of recently developed technologies will, to a greater or lesser degree, help in combating the effects of the storage explosion.
Cover for Practical Compliance

Practical Compliance

This paper describes a few situations organisations are encountering - or will encounter - to clarify some of the basic compliance data storage needs.
Cover for Open-Tec CStore Content Archive

Open-Tec CStore Content Archive

There are as yet no direct competitors in this niche, yet it addresses a growing requirement. CStore has major disruptive market potential.
Cover for The strategic importance of email encryption

The strategic importance of email encryption - Securing business data and email traffic throughout its journey

As email is now fully embedded as a business tool and is being used to transfer critical, sensitive data, it is becoming increasingly important to provide a secure, robust and manageable encryption service for email users. Email encryption cannot be…
Back To Top