BYOD_2015_small
Aug. 10 2015
For information technology (IT) security managers, bring your own device (BYOD) is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation... View More
buildinfo_V2_SMALL
July 15 2015
Many of the comments I hear from executives regarding information governance planning include: "We don’t want to boil the ocean." "There are too many conflicting definitions." "No one follows it
ROI_small
July 7 2015
Everyone is talking about information governance (IG) and how it can be used to manage the rapid pace of electronic information growth. IG is defined by Gartner as, “The specification of decision
July 6 2015
Videk, Inc. a leading provider of document integrity assurance systems has signed a significant distribution and sales agreement with Canon Japan, it was announced today. Videk will develop an integrated... View More
Platformchoice_small
June 25 2015
Governance, risk and compliance (GRC) technology that integrates multi-stakeholder requirements on a single platform is often held out as the holy grail of GRC—especially by GRC vendors. Nevertheless,... View More
businessrisk_small
April 1 2015
Most organizations are critically dependent on technology to operate in the modern world. For these organizations, technology risk management often becomes a one-dimensional exercise: an obsession with... View More
steps_2015_small
March 5 2015
What is top of mind for senior executives and directors this year? Regulatory changes and heightened regulatory scrutiny, succession challenges, economic conditions and cyber threats, according to the... View More
risk_2015_small
Feb. 11 2015
Protiviti partnered with North Carolina State University’s Enterprise Risk Management Initiative to conduct our third annual "Executive Perspectives on Top Risks" survey and obtained the views of... View More
looking2015_small
Jan. 27 2015
Cybercrime targeting of commercial enterprises and organizations is rampant. Increasingly sophisticated, organized crime groups are gaining improper access to point-of-sale systems and corporate networks... View More
hacker_small
Jan. 13 2015
What do JPMorgan Chase, Home Depot, Target, Adobe, TJX and Sony all have in common? They have all been hacked and have given up tens of thousands or millions of records containing credit/debit cards, email... View More
shadow_small
Oct. 30 2014
Here we are in October already, a month known for tricks, treats and scary things lurking about waiting to frighten you. While it is a time for fun and social interactions, it is not a time you want to... View More
lost_small
Oct. 29 2014
Thinking about mobile security keeps me up at night. It probably keeps you up too. On a recent evening, I was browsing the findings of a study by McAfee and Ponemon Institute titled “The Lost Smartphone... View More
Oct. 29 2014
kloudtrack®and Formtree today announced a collaborative effort to integrate Formtree mobile data collection solutions with kloudtrack cloud-based data management and workflow systems. The integrated... View More
library_small
Oct. 9 2014
There is a lot of buzz growing once again about information governance and the importance of organizing information to align with compliance requirements and findability. This is not a new concept nor... View More
Dictionary_small
Sept. 3 2014
There has been a great deal of confusion around the term information governance (IG) and how it is often confused with other similar industry terms, such as information technology (IT) governance and data... View More
coverage_small
Aug. 14 2014
IT risk is everyone’s problem. By “everyone,” we mean the board of directors, senior management, process owners and internal auditors. Internal audit departments play a critical role... View More
Aug. 13 2014
Mi-Corporation, the Mobile Information Corporation, today announced that WasteStrategies has built its proprietary compliance management system – WS AuditPRO – for managing EPA, OSHA, and other... View More
reputation_small
Aug. 6 2014
Looking at the 28 topics that DOCUMENT Media highlights for subscribers and knowledge management (KM) practitioners on its website, I couldn’t help but notice that some of them were direct contributors... View More
define_small
July 17 2014
Five years ago, in March 2009, I first published an eBook called \"Making the Case for Information Governance.\" In the eBook I discussed—among other things—how to define information governance... View More
audit_607
July 14 2014
In a recent issue of The Bulletin, we discuss Protiviti’s future auditor vision. This is something about which I am particularly passionate, as I think it speaks on many levels to how internal audit... View More