You are here

Share
Safe Harbor and Data Sovereignty
Posted by Yorgen Edholm
For U.S. companies handling data belonging to EU citizens, the clock is ticking. From 2000 to 2015, U.S. companies could join the U.S.-EU Safe Harbor Program and self-certify that they met all the requirements of the EU data privacy regulations. Self-certification under Safe Harbor was both...
real time secure file access - even in the field
Posted by Hormazd Romer
Much of the discussion about Bring Your Own Device (BYOD) policies focuses on employee productivity and IT security . This makes sense: BYOD is certainly delivering on its promise to increase productivity, while also creating some challenging problems in the area of IT security and compliance. What...
international data sovereignty
Posted by Paula Skokowski
Real estate isn’t the only kind of business where location matters. Since Edward Snowden revealed the extent of the U.S. government’s spying on private citizens, location has been a hot topic in data security and IT management, especially for global companies. The location of data now...
Posted by Paula Skokowski
“Data privacy” is a term bandied about by governments, courts, law enforcement agencies and advocacy groups. Each has their own interpretation of the laws that impact a person’s data but what are an individual’s rights when it comes to their data? The EU’s Data...
Posted by Paula Skokowski
If you want to appreciate the promise and the challenge of applying new technology to healthcare, look no further than the Healthcare Information and Management Systems Society (HIMSS). For over fifty years, HIMSS has sought to improve healthcare with information technology. Healthcare facilities...
Posted by Hormazd Romer
eDiscovery – the collection, identification, archivi ng , and delivery of Electronically Stored Information (ESI) requested by legal teams and courts as part of an investigation, litigation, audit, industry compliance or other activity – is an ongoing challenge for organizations,...
Posted by Yorgen Edholm
On Tuesday, October 6, 2015, the European Court of Justice, the highest court in the European Union, struck down the Safe Harbor agreement that enabled organizations, including leading tech companies such as Google and Facebook, to transfer personal data from Europe to the United States without...
Posted by Keith Poyser
Any American or European with a smartphone has access to a wealth of internet-enabled data and services: social media platforms, news and ecommerce websites, and mobile apps for everything from monitoring health metrics to ordering a car service downtown. Other capabilities include mobile banking,...
Posted by Paula Skokowski
Imagine that you are the Chief Security Officer for a large enterprise organization, and you discover a small TV crew working its way through your offices, panning a video camera back and forth, recording everything in sight: product schedules on white boards, financial reports lying about on desks...
Posted by Vidhya Ranganathan
Security researchers in Germany have discovered a flaw in the way that thousands of popular mobile apps store users' data online, making their passwords, addresses, door codes, location data, and other personal information vulnerable to a security breach. A joint research team from the...
Posted by Claire Galbois
The latest report from Ofcom , the UK communications regulator, has important news for every enterprise IT organisation: As of this year in the UK, the most popular device for accessing the Internet is the smartphone. Specifically, the 2015 Communications Market Report found that 33% of Internet...
Posted by Vidhya Ranganathan
These days, every IT conference seems to offer a custom mobile app with a built-in conference agenda, a list of attendees, a map of the exhibit hall, and perhaps a dedicated messaging service. Conference attendees download these apps all the time and leave them on their tablets and smartphones...
Posted by Paula Skokowski
Recent data breaches at lTarget, Sony and the U.S. Government's Office of Personnel Management have garnered considerable media attention. But sizable data breaches have taken place at other organizations, too. One industry that doesn't get a lot of attention is education, namely...
man working on the beach
Posted by Keith Poyser
Is your office ready for the dog days of summer? Long days, warm weather, the lure of travel, if only to a nearby park or beach—many employees naturally are thinking of escaping the office for time away. For the past year, since the passage of home working legislation in the UK , employees...
Posted by Hormazd Romer
We are thrilled to be positioned in the Leaders quadrant of the 2015 Gartner Magic Quadrant for Enterprise File Sync and Share (EFSS), for the second year in a row. A lot has changed in the EFSS market between 2014 and 2015. The space has gained more visibility, customers' needs have evolved,...
Man viewing content on tablet with a magnifying glass
Posted by Keith Poyser
Since the opening of Parliament, there has been plenty of questions raised over the Communications Data Bill, also known as the ‘Snooper’s Charter’, which would require phone and internet companies to maintain records of people’s internet, email and mobile phone activity,...
Person viewing mobile phone screen
Posted by Vidhya Ranganathan
Users of Android smartphones can protect content from an insidious new MMS hack by storing their content in kiteworks , Accellion’s secure mobile content platform. The new hack enables an attacker to take control of any Android smartphone simply by sending a text message to the smartphone...
Man accessing information on a mountain top.
Posted by Yorgen Edholm
We are pleased to announce that we have been positioned as a Leader in the Gartner Magic Quadrant for Enterprise File Synchronization and Sharing (EFSS) for the second year in a row. The EFSS market is a competitive and rapidly evolving landscape. It's marked by numerous offerings from a...
analyst viewing multiple computer screens
Posted by Vidhya Ranganathan
This week’s news that the head of Homeland Security and 28 senior staffers were using personal email on their Department of Homeland Security work computers , illustrates how lax many organizations are regarding allowing employees to mix personal communications with business. The DHS has...
Broken down office desk
Posted by Keith Poyser
The typewriter. The fax machine. Corded phones. Over the past few decades, technology has evolved, and, along the way, slower and cumbersome species of technology have become extinct. What’s on today’s endangered species list? The office desk and, along with it, our ideas of in-office...

Pages