Home

Latest News

Organizations Risk Data Loss Due to Lack of Visibility in Employee File Sharing  

188
New research confirms that organizations have poor visibility into which file sharing applications are being used in the enterprise to share information.
Cybersecurity: If You Can’t Patch Stupid, Lead by Example - Joshua Greenbaum

179
Focusing consumer thinking on the nitty-gritty of securing content represents an important milestone in the convergence of content management and security.
CollaboristaBlog Roundup

221
Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features Dropbox, recent hacks and security best practices.
Hackers Target Dropbox, Exposing Risk of Consumer Sync and Share

338
Anonymous hackers claim they stole Dropbox login information. Although Dropbox is denying these claims, here are a few precautionary tips you can take.
The “Drop” in Dropbox Is Real

353
Dropbox lived up to its name — “dropping” and accidentally deleting some user files. Apparently, a malfunction in Dropbox Selective Sync feature was the culprit, says CNET.
atm

849
Cybercrime can mean big money for hackers. According to new reports, malicious hackers are emptying ATMs full of cash. What's the answer to this problem?
CollaboristaBlog Roundup

251
Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features Shadow IT and Backoff malware.
Shedding the Light on Shadow IT

549
As a result of using unsanctioned consumer file sharing applications, employees may unknowingly put their company's sensitive business information at risk.
CollaboristaBlog Roundup

521
Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features data security research and IRM.
How the Traditional Boundaries of Business have Evolved

592
In a digital world, information must flow freely for productivity, and be secure. To meet these needs, enterprises can apply Information Rights Management.
What You Need to Know About the Bash Bug

545
As a follow up to our blog last week, here’s everything you need to know about the Bash Bug vulnerability, including what it is and how it can be exploited.
Companies Not Protecting Growing Data Assets, Survey Says

551
There are plenty of companies guilty of not applying data security best practices, according to the “2014 IT Security and Privacy Survey,” from Protiviti.

Follow Us