You are here

Share
Accellion and Microsoft Office 365
Posted by Dee Dee Kato
Accellion recently announced a number of key integrations with Microsoft Office Online that enhance productivity for enterprise employees editing, sharing and collaborating on Word, Excel and PowerPoint files, whether they are stored on-premises or in the cloud. The end result? Employees are more...
fedRAMP
Posted by Dee Dee Kato
kiteworks by Accellion is in the process of becoming FedRAMP-certified. What is FedRAMP ? It’s a rigorous security assessment and authorization framework developed by cybersecurity and cloud experts from many government agencies, including the General Services Administration (GSA), National...
Forrester Wave for EFSS Hybrid Solutions
Posted by Amy Chu
We are delighted to share that we have been named a Leader in the recently released report: The Forrester Wave™: Enterprise File Sync and Share, Hybrid Solutions, Q2 2016. This report evaluates the ten most significant hybrid cloud solution providers in EFSS in an effort to assist Enterprise...
kiteworks and Microsoft Office 365
Posted by Dee Dee Kato
How awesome would it be to have a secure, single point of access to find, edit and share all Microsoft files stored in an enterprise’s many on-premises and cloud content systems from any device? Sounds too good to be true? Well, this isn’t a pipe dream. In fact, secure file access,...
How safe is your healthcare organization?
Posted by Marianna Prodan
MedStar Health, 21 st Century Oncology, Hollywood Presbyterian Hospital. The list of cyber attacks targeting the healthcare industry goes on and on. The ten largest healthcare data breaches in 2015 compromised the personal health information (PHI) of almost 110 million Americans. That’s...
Crypto wars
Posted by Yorgen Edholm
Should technology companies undermine their own security features to help government agencies read encrypted data? The answer might depend on whose encrypted data is being read. Should encryption be purposely broken to facilitate mass surveillance? Most American would say “no,” judging...
Privacy Shield
Posted by Yorgen Edholm
In October 2015, the European Court of Justice (ECJ), the highest court in the European Union (EU), struck down the EU-U.S. Safe Harbor Agreement which had allowed U.S. companies to certify that they complied with the EU’s stringent data privacy regulations. Through this certification, U.S...
data breaches are board level issue
Posted by Yorgen Edholm
When it comes to data breaches and the professional longevity of CEOs and boards of directors, one can't help but say: “How times have changed!” Compare the reaction to almost any recent headline-grabbing data breach—Anthem, Ashley Madison, Sony, Wyndham Resorts—to the...
Decrypting Encryption
Posted by Hormazd Romer
There has been a heated debate over the last several months about encryption. Most consumers and corporations want it. Government agencies, particularly those in intelligence and law enforcement, don’t. Who is the rightful owner of your data? It depends on who you ask and what country you...
A data breach requires a thorough analysis of your data transfer practices
Posted by Hormazd Romer
A lot is written these days about best practices for preventing data breaches—practices such as keeping critical systems up to date with patches, ensuring firewalls and AV scanners are updated with signature files, educating employees about the risks of phishing attacks, and so on. These...
Safe Harbor and Data Sovereignty
Posted by Yorgen Edholm
For U.S. companies handling data belonging to EU citizens, the clock is ticking. From 2000 to 2015, U.S. companies could join the U.S.-EU Safe Harbor Program and self-certify that they met all the requirements of the EU data privacy regulations. Self-certification under Safe Harbor was both...
real time secure file access - even in the field
Posted by Hormazd Romer
Much of the discussion about Bring Your Own Device (BYOD) policies focuses on employee productivity and IT security . This makes sense: BYOD is certainly delivering on its promise to increase productivity, while also creating some challenging problems in the area of IT security and compliance. What...
international data sovereignty
Posted by Paula Skokowski
Real estate isn’t the only kind of business where location matters. Since Edward Snowden revealed the extent of the U.S. government’s spying on private citizens, location has been a hot topic in data security and IT management, especially for global companies. The location of data now...
Posted by Paula Skokowski
“Data privacy” is a term bandied about by governments, courts, law enforcement agencies and advocacy groups. Each has their own interpretation of the laws that impact a person’s data but what are an individual’s rights when it comes to their data? The EU’s Data...
Posted by Paula Skokowski
If you want to appreciate the promise and the challenge of applying new technology to healthcare, look no further than the Healthcare Information and Management Systems Society (HIMSS). For over fifty years, HIMSS has sought to improve healthcare with information technology. Healthcare facilities...
Posted by Hormazd Romer
eDiscovery – the collection, identification, archivi ng , and delivery of Electronically Stored Information (ESI) requested by legal teams and courts as part of an investigation, litigation, audit, industry compliance or other activity – is an ongoing challenge for organizations,...
Posted by Yorgen Edholm
On Tuesday, October 6, 2015, the European Court of Justice, the highest court in the European Union, struck down the Safe Harbor agreement that enabled organizations, including leading tech companies such as Google and Facebook, to transfer personal data from Europe to the United States without...
Posted by Keith Poyser
Any American or European with a smartphone has access to a wealth of internet-enabled data and services: social media platforms, news and ecommerce websites, and mobile apps for everything from monitoring health metrics to ordering a car service downtown. Other capabilities include mobile banking,...
Posted by Paula Skokowski
Imagine that you are the Chief Security Officer for a large enterprise organization, and you discover a small TV crew working its way through your offices, panning a video camera back and forth, recording everything in sight: product schedules on white boards, financial reports lying about on desks...
Posted by Vidhya Ranganathan
Security researchers in Germany have discovered a flaw in the way that thousands of popular mobile apps store users' data online, making their passwords, addresses, door codes, location data, and other personal information vulnerable to a security breach. A joint research team from the...

Pages