Home

Latest News

4 Steps to Take for Brokerage Cybersecurity  

52
A comprehensive approach to data security for regulated industries involves more than just technology. It should include these key cybersecurity pillars.
Are You in Denial About DDoS Attacks?

173
Don’t think your organization is vulnerable to DDoS attacks? This report may make you think again. What can you do to reduce your risk of being compromised?
CollaboristaBlog Roundup

108
Welcome to your guide on the most interesting collaboration, information security, and data privacy news. This week features business file sharing tips.
Lyft Claims Exec Lifted its Docs, Parked Them in Dropbox, and Drove Off?

384
The courtroom fight between Uber and its rival Lyft is a potential cautionary tale about mixing personal cloud applications with enterprise class solutions.
9 Steps to Stop Risky File Sharing

471
Ungoverned file sharing presents significant data security risks. Here are nine steps you should consider to enable a secure, collaborative environment.
A Vote for Intralinks — A Vote for Secure Data

281
Voting is open for the 2015 SC Magazine Awards. This year, Intralinks is nominated for “Best Cloud Computing Security Solution.” Please show your support!
CollaboristaBlog Roundup

318
Welcome to your weekly guide on interesting data sharing and security updates. This week features new file sharing research from Ponemon Institute and Ovum.
Improperly Secured Data is a Serious Threat to CIOs and CTOs

381
This retention of data is causing problems for CIOs and CTOs. Ovum’s “Content is the New Perimeter” report shares the consequences of inadequate security.
Treasury’s New Bank Security Rules May Have Huge Cloud Impact

486
The U.S. Treasury Department has been considering implementing new bank security rules that would strengthen data security at banks and brokerage firms.
How Hackers can Smuggle Out Your Company's Data, via Video

1340
Ask yourself this: Is your company's sensitive data being stolen? Organisations concerned about data loss, deploy security software to protect information.
Intralinks and Ponemon Institute - Breaking Bad The Risk of Unsecure File Sharing Infographic

834
Ponemon Institute and Intralinks unveiled research into the security threats of unsecure file sharing by employees and how organizations are reacting.
The Growing Burden of Content Control for CIOs, CISOs, and CTOs

468
Files containing sensitive information tend to last a long, long time. And the volume of content keeps piling up, as a recent Ovum Research report reveals.

Follow Us