Posted by Nina Seth on April 21, 2011
I recently had an opportunity to watch race car driving live at Infineon Raceway in Sonoma. If you’re a car enthusiast like me, nothing is more exciting than seeing hot sports cars driving fast on a track. Drivers are continually trying to outmaneuver each other to gain position and push their own driving abilities to the limit.
Posted by Paula Skokowski on April 19, 2011
Last weekend marked the 40th anniversary of the introduction of the File Transfer Protocol (FTP). While FTP certainly isn’t pretty to use, it has served a purpose. Originally designed to enable programmers to move files between systems, FTP has continued to serve that purpose nobly for the past 40 years.
However IT departments who have used FTP as the basis for employees to share files across the enterprise, have had less successful results.
Posted by Paula Skokowski on April 15, 2011
If a tree falls in a forest, and no one hears it, does it make a sound? Or the file sharing equivalent – if an employee uses a free personal file sharing account, and IT doesn’t know about it, does it still present a security risk? You bet it does.
Posted by Paula Skokowski on April 12, 2011
The Epsilon data breach of last week keeps on giving, with millions of email notifications being sent out from the companies affected, informing recipients of the incident. The New York Times has weighed in and made recommendations for Congress to address this type of failure for consumers with an editorial “Who Really Sent That E-Mail?”
Posted by Nina Seth on April 7, 2011
We should all thank Corinne Schmid at CMSWire for reminding us of the central role that employees play in Enterprise Collaboration. Far too often articles on collaboration focus on business benefits derived from collaboration, rather than the efficiencies gained by individuals. But the fact remains that if:
Enterprise Collaboration is a journey, it is used to reach a destination by its drivers – Employees.”
Posted by Paula Skokowski on April 5, 2011
10. Your company has already had a data breach. Don’t make the same mistake twice. According to a recent survey by McAfee, only half of the companies who have had a data breach or attempted data breach, have taken steps to remediate and protect systems for the future.
Posted by Paula Skokowski on March 31, 2011
Thanks Mike Rothman, analyst and president at security research firm Securosis, for pointing out in this week's CSO article by George Hulme, that denying execs the use of their shiny new iPads is not going to make anyone popular. We agree with you Mike, "You have to try to find a way to secure these devices the best you can."
Posted by Nina Seth on March 30, 2011
I’m a certified news junkie. I read at least half a dozen online publications every day and one of my favorite sites is GigaOM, in particular their WebWorkerDaily articles. I enjoy reading their articles on how social media is disrupting information flows in the enterprise, and the impact of the increasing use of consumer technologies in the workplace.
Posted by Paula Skokowski on March 29, 2011
Accellion is participating at the Gartner Portals, Content and Collaboration (PCC) Summit this week as part of the launch of our new Secure Collaboration Solution.
A couple of interesting takeaways from the first day of the Gartner Summit:
Posted by Yorgen Edholm on March 28, 2011
Today Accellion announced the introduction of Accellion Secure Collaboration with Mobile Apps for the enterprise.
We understand that collaboration means many things to many people. Accellion approaches collaboration from a file sharing perspective and is geared toward securely sharing enterprise information.
Accellion Secure Collaboration extends the award-winning file transfer capabilities our customers already enjoy and also: