Intralinks’ Approach to Data Sovereignty Compliance
Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...
View ArticleCyber Risk and Data Security Top of Mind at Insurance and Risk Linked...
The cyber insurance market is growing significantly; it's more than doubled in the past two years growing from $1 billion in 2013 to $2.5 billion 2015. The post Cyber Risk and Data Security Top of Mind...
View Article4 Easy Security Tips to Keep Data Protected
Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...
View ArticleHaving Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.
Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...
View ArticleWho Says the Security Perimeter is Dead? Content is the New Perimeter.
It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...
View ArticleTrust Needs to be Earned
Protecting confidential information as it is shared with external parties around the world is not easy, and jeopardising it could cost your business everything. As our most sensitive information...
View ArticleTechnologies HR Professionals Should Know to Boost Productivity and Compliance
The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...
View ArticleMaintaining Costs while Maintaining Data Privacy Compliance
A recent study by Thomson Reuters highlighted that 69 percent of firms (70 percent in 2015) expected regulators to publish even more information in the coming year, with 26 percent expecting...
View ArticleTake Your Own Best Advice: Email Safely
If we in the Legal department were to measure our email practices by the standards we advise for the other departments in our organization, would we pass? Phishing messages continue show up in our...
View ArticleAre Your Investors Requesting a Copy of Your Compliance Manual? Here’s what...
As data security continues to be a focus in the hedge fund space, clearly articulated compliance manuals can be a competitive advantage for firms and result in more allocations. More and more...
View ArticleHow Information Rights Management Helps Prevent File Leakage
Information Rights Management (IRM) permissions and controls work at the single document level. Thus, the files remain secure and in the owner's control. The post How Information Rights Management...
View ArticleCollaboristaBlog Roundup September 5
Your guide to interesting data sharing, security, and privacy news. This week features data security tips, IRM insights and recent hacks in the news. The post CollaboristaBlog Roundup September 5...
View ArticleWhy Content, not Identity, is the NEW Enterprise Perimeter
The enterprise perimeter used to be protected by the firewall — recently, that perimeter has shifted. Find out why content is the NEW enterprise perimeter. The post Why Content, not Identity, is the...
View ArticleThe Secure Way to Travel
Many people are collaborating and working remotely. No matter the location, security is ongoing. Here are tips to help keep information secure on-the-go. The post The Secure Way to Travel appeared...
View ArticleCollaboristaBlog Roundup September 26
Welcome to our guide on interesting data sharing, cybersecurity, and privacy news. This week features information rights management and security insights. The post CollaboristaBlog Roundup September 26...
View ArticleIRM: The Best Defense Against Industrial Espionage
Industrial espionage will never be eradicated, but information rights management (IRM) technology now exists to help mitigate internal and external threats. The post IRM: The Best Defense Against...
View ArticleHow the Traditional Boundaries of Business have Changed
In a digital world, information must flow freely for productivity, and be secure. To meet these needs, enterprises can apply Information Rights Management. The post How the Traditional Boundaries of...
View ArticleCollaboristaBlog Roundup October 3
Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features data security research and IRM. The post CollaboristaBlog Roundup October 3...
View ArticleIntralinks IRM by design™: Lifetime Content Control
Information Rights Management (IRM) helps secure the enterprise. Intralinks IRM by design™ protects sensitive information no matter how it's shared. The post Intralinks IRM by design™: Lifetime Content...
View ArticleCommon Mistakes When Sharing Business Information
Here are four common mistakes employees make when sharing information, and best practices organizations can follow to alleviate risks. The post Common Mistakes When Sharing Business Information...
View ArticleCollaboristaBlog Roundup October 31
Welcome to your weekly guide on interesting data sharing, security, and privacy updates. This week features file sharing mistakes and security for lawyers. The post CollaboristaBlog Roundup October 31...
View ArticleThe Growing Burden of Content Control for CIOs, CISOs, and CTOs
Files containing sensitive information tend to last a long, long time. And the volume of content keeps piling up, as a recent Ovum Research report reveals. The post The Growing Burden of Content...
View ArticleImproperly Secured Data is a Serious Threat to CIOs and CTOs
This retention of data is causing problems for CIOs and CTOs. Ovum’s “Content is the New Perimeter” report shares the consequences of inadequate security. The post Improperly Secured Data is a Serious...
View ArticleLyft Claims Exec Lifted its Docs, Parked Them in Dropbox, and Drove Off?
The courtroom fight between Uber and its rival Lyft is a potential cautionary tale about mixing personal cloud applications with enterprise class solutions. The post Lyft Claims Exec Lifted its Docs,...
View ArticleThe Riskiest File Sharing Technologies
Employees need file sharing tools that enable productivity and facilitate communication. However, when ungoverned, these same applications risk data loss. The post The Riskiest File Sharing...
View ArticleGeneral Counsel Responsibilities of the Extended Enterprise
The role of the General Counsel has evolved considerably to include important risk management and business decision-making responsibilities. The post General Counsel Responsibilities of the Extended...
View ArticleCollaboristaBlog Roundup: The Best of 2014
From vulnerabilities to hacking methods and data leaks, to stronger techniques for information security and data privacy, 2014 was a year to remember. The post CollaboristaBlog Roundup: The Best of...
View ArticleElectronic Investigator Site File: The Solution for Disaggregated Industries
An electronic investigator site file (eISF) technology platform helps life sciences organizations efficiently operate in a disaggregated industry. The post Electronic Investigator Site File: The...
View ArticleFederal Regulator Implicated in Data Breach at California Credit Union
The regulatory issues financial services companies face may increase in 2015. The rules require that sensitive data be shared with examiners and agencies. The post Federal Regulator Implicated in Data...
View ArticleIntralinks VIA Brings Controlled Collaboration to Enterprise Content
Collaboration on content is critical for enterprises. With the latest update to Intralinks® VIA™, Intralinks expands its information rights capability. The post Intralinks VIA Brings Controlled...
View ArticlePracticing Law Securely — No More Attachments
How should lawyers be securely storing, transmitting, and sharing information? Here are some law information security best practices from Bob Blacksberg. The post Practicing Law Securely — No More...
View ArticleWhy Hackers Are Getting into the Espionage-as-a-Service Business
Espionage is typically connected with organizations backed by the governments of nation states. However, more private hacker groups are entering the scene. The post Why Hackers Are Getting into the...
View ArticleBreaking Bad: Cracking the User Controlled Content Sharing Habit in the...
Intralinks' Richard Anstey meets with Risky Business for a podcast to talk about the security challenges and risks of ungoverned file sharing services. The post Breaking Bad: Cracking the User...
View ArticleControlling Content in the Digital Workplace
The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace appeared...
View ArticleThe Data Sovereignty Dilemma of the Digital Workplace
If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...
View ArticleThe Challenges of Data Sovereignty in the Cloud
The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...
View ArticlePracticing Law Securely — Information Rights Management: What, When, How
Information Rights Management (IRM) is a capability that provides end-to-end control of a document — without impeding on collaboration and productivity. The post Practicing Law Securely — Information...
View ArticleControl Study Documents in a Collaborative World
How Intralinks' information rights management technology helps sites keep complete control over documents during collaboration in clinical trials. Read the full piece on WorldPharma. The post Control...
View ArticleDon’t Hedge Your Bets on Substandard Sharing Practices
The accessibility of data has made our lives easier, but there is room for improvement as far as security is concerned, especially for hedge funds. The post Don’t Hedge Your Bets on Substandard Sharing...
View ArticleStriking the Balance Between Information Security and Usability
With growing business concerns around data security, privacy and compliance, here's how organizations can strike the balance between security and usability. The post Striking the Balance Between...
View ArticleIndustry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...
Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...
View ArticlePracticing Law Securely — Working with Information Rights Management
Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...
View ArticleGeneral Data Protection Regulation: Protecting Both the Customers and the...
With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...
View ArticleMicrosoft Dublin Case Highlights Impending Data Privacy “Firestorm”
The U.S. Justice Department is seeking to access emails stored in a Microsoft data center in Ireland which could bring data privacy and regulatory change. The post Microsoft Dublin Case Highlights...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleData Privacy Regulations: Bad for Business?
An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...
View ArticlePracticing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleMistakes: Unfortunate. Unforeseen. Unforgivable.
With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....
View ArticleData Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?
To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...
View Article