Articles Videos
GettyImages-1369171053
Aug. 28 2023
What can go wrong without rigorous data security and compliance? In short, everything. According to Statista, a market leader in providing reliable market, company and consumer data, cybersecurity r... View More
Oct. 28 2022
Business Forms Management Association (BFMA), the association for forms and business process professionals, is recognizing Cybersecurity Month this October by sharing tips on security and risk... View More
ssl-2890762_1280
April 8 2021
The Solar Winds cybersecurity attack and the recent zero-day exploit involving Microsoft Exchange servers have exposed vulnerabilities in the IT infrastructure of organizations at every level, from sm
830x539_Protiviti
Dec. 10 2019
These days, there’s no shortage of news stories about the latest data breach, which may leave a lot of cybersecurity professionals in a cold sweat more frequently. Furthermore, some of these professionals... View More
What IT Leaders Need to Know About Cloud and Data
May 15 2019
In information technology (IT) departments around the world, discussions around cloud migration and data privacy dominate the conversation. Consumers expect... View More
Data Analytics and Cybersecurity Top Investment
Jan. 25 2019
In 2019, look for data analytics and artificial intelligence (AI) to become game-changing technologies for the government sector, according to a recent Gartner survey. Government chief information officers... View More
The Internet of Things Ushers in Cybersecurity Thr
Nov. 21 2017
What do all of these things have in common: implanted medical devices and critical care devices, factory robots, drones, autonomous vehicles, and Fitbits? All of them are connected through the Internet... View More
Cybersecurity Culture
Oct. 4 2017
The current approach to cybersecurity is retroactive. Many organizations naïvely believe they aren’t targets and that investing in cybersecurity is futile. With cyber attacks becoming more prominent,... View More
Cybersecurity Pros Care About Governance - DOCUMEN
April 6 2017
Cybersecurity is a strategic priority for most organizations. With recent high-profile breach incidents, including Home Depot, Target, and Sony, many companies are asking themselves, “Will I be next?”... View More
Interest in the Cloud - DOCUMENT Strategy
Jan. 23 2017
A recent report from market research company IBIS projects the insurance software market will exceed $8 billion in 2016. The company attributed growth in the sector to an increased interest in ... View More
CISO
June 15 2016
If you didn’t already know, there is a new sheriff in town within the corporate structure, and it’s the chief information security officer (CISO). If you need proof, look no further than the... View More
ExecTop
Oct. 12 2015
Cybersecurity is top of mind, from the boardroom and C-suite to information technology (IT), legal, finance and more, but does that translate to effective policies and actions?... View More
  • I have had the pleasure of working in the information management and process automation fields for near 40 years. During this time, I held many different positions, two of which really opened my eyes
  • Generative AI (Gen AI) has captured the imagination of industries worldwide, but the true potential lies in its practical applications
  • Digital Asset Management (DAM) is a system designed for organizing, storing and retrieving media files and managing digital rights and permissions. DAM systems have become a core component of creative
  • Is Generative AI tipping the scales in favor of building Enterprise Content Management (ECM) software, or will it ever get to that point?
  • Information technology has undergone a major transformation in recent years, sparked by the rise of “big data.”