Ever since the introduction of cloud and cloud services, we have heard the mantra to migrate the enterprise information infrastructure to the cloud. While this may be an attractive idea, there has long... View More
In content management, metadata is used to uniquely identify content objects, improve search, and manage the life cycle of content. In some cases, it can even reference information that is not necessarily... View More
Cybersecurity is getting harder, not easier. So, are you cyber resilient? Here's a look at a recent Ponemon Institute and IBM study on why cybersecurity incidents still pose a major problem for many businesses
IBM this week unveiled their new data science and machine learning platform, displaying their aggressive push to speed up artificial intelligence (AI) adoption at organizations worldwide. The new Cloud... View More
As artificial intelligence (AI) becomes more ingrained into our daily lives, we are starting to do things very differently. According to a recent article, the ... View More
Security breaches, privacy violations, and lawsuits are in the news every day. Today, it is a matter of when, not if, it will happen. When hackers breach your security, what will they do with your internal... View More
Xerox (NYSE: XRX) is named a leader in the first IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment report for its commitment to enterprise security and its broad... View More
The General Data Protection Regulation (GDPR) represents possibly the most sweeping change to data protection laws in over 20 years. When it goes into effect on May 25, 2018, the new regulation will impact... View More
The current approach to cybersecurity is retroactive. Many organizations naïvely believe they aren’t targets and that investing in cybersecurity is futile. With cyber attacks becoming more prominent,... View More
Data, data mining, and big data are topics that regularly appear in many newspapers, business magazines, or e-newsletters today—and all of this coverage is not lost on corporations, businesses, and... View More
OpenText (NASDAQ: OTEX) (TSX: OTEX), a global leader in Enterprise Information Management (EIM), announced today that it has entered into a definitive agreement to acquire Guidance Software (NASDAQ: GUID),... View More
Many businesses look at information security from the perspective of locking down devices and repositories, trying to control access, and even preventing technology use out of fear that something might... View More
If you were one of the 300,000 companies across 150 countries that got hit with the WannaCry ransomware attack, well, the name is very appropriate. Designed to encrypt all the data files on the infected... View More
Every day, we are hit with more news alerts about data breaches, systems being hacked, and all kinds of implications that the weakest link in the information ecosystem is the technology. Yet, for many... View More
Data and analytics have redefined the way we compete. Data is a critical corporate asset that organizations are starting to monetize in new ways to get ahead of their competition. The bottom line? Companies... View More
Onfido, the identity verification provider, has launched the Regtech Principles for Innovation to encourage greater collaboration between regulators and financial services. Aimed at building an inclusive... View More
Information management and privacy haven’t historically been aligned. Managing information through its life cycle—from creation through sharing and collaborating, to disposition—hasn’t... View More
Oops, you just got back from vacation, and the Postal Service forgot to hold your mail, now what? Was your security compromised? This happened to a friend of mine, and she was quite upset—what with... View More
IBM Security (NYSE: IBM) today announced plans to acquire Agile 3 Solutions, a developer of software used by the C-Suite and senior executives to better visualize, understand and manage risks associated... View More
As businesses today strive to develop a strong, secure framework for information governance, the first thing they must do is gain a comprehensive understanding of their existing information landscape and... View More
Robotic Process Automation (RPA) has long been recognized as a tool that clicks buttons faster than humans, excelling at repetitive tasks like moving files or exporting reports
For decades, customer communications management (CCM) has focused on outbound engagement, such as statements, explanations of benefits (EOBs) and annual notifications of changes (ANOCs), delivered in
When I think about how far customer communications have evolved, it’s clear that we’ve entered a new era, one where the regulated document is moving from being an artifact of a transaction
How much do I owe? How do I pay? Where’s my bill? Are any of your customers asking these questions? If so, it might be time to rethink your utility bills.