Quantcast
Channel: Information rights management – Intralinks Blog
Browsing all 68 articles
Browse latest View live

Improperly Secured Data is a Serious Threat to CIOs and CTOs

This retention of data is causing problems for CIOs and CTOs. Ovum’s “Content is the New Perimeter” report shares the consequences of inadequate security. The post Improperly Secured Data is a Serious...

View Article


Lyft Claims Exec Lifted its Docs, Parked Them in Dropbox, and Drove Off?

The courtroom fight between Uber and its rival Lyft is a potential cautionary tale about mixing personal cloud applications with enterprise class solutions. The post Lyft Claims Exec Lifted its Docs,...

View Article


The Riskiest File Sharing Technologies

Employees need file sharing tools that enable productivity and facilitate communication. However, when ungoverned, these same applications risk data loss. The post The Riskiest File Sharing...

View Article

General Counsel Responsibilities of the Extended Enterprise

The role of the General Counsel has evolved considerably to include important risk management and business decision-making responsibilities. The post General Counsel Responsibilities of the Extended...

View Article

CollaboristaBlog Roundup: The Best of 2014

From vulnerabilities to hacking methods and data leaks, to stronger techniques for information security and data privacy, 2014 was a year to remember. The post CollaboristaBlog Roundup: The Best of...

View Article


Electronic Investigator Site File: The Solution for Disaggregated Industries  

An electronic investigator site file (eISF) technology platform helps life sciences organizations efficiently operate in a disaggregated industry. The post Electronic Investigator Site File: The...

View Article

Federal Regulator Implicated in Data Breach at California Credit Union

The regulatory issues financial services companies face may increase in 2015. The rules require that sensitive data be shared with examiners and agencies. The post Federal Regulator Implicated in Data...

View Article

Intralinks VIA Brings Controlled Collaboration to Enterprise Content

Collaboration on content is critical for enterprises. With the latest update to Intralinks® VIA™, Intralinks expands its information rights capability. The post Intralinks VIA Brings Controlled...

View Article


Practicing Law Securely — No More Attachments

How should lawyers be securely storing, transmitting, and sharing information? Here are some law information security best practices from Bob Blacksberg. The post Practicing Law Securely — No More...

View Article


Why Hackers Are Getting into the Espionage-as-a-Service Business

Espionage is typically connected with organizations backed by the governments of nation states. However, more private hacker groups are entering the scene. The post Why Hackers Are Getting into the...

View Article

Breaking Bad: Cracking the User Controlled Content Sharing Habit in the...

Intralinks' Richard Anstey meets with Risky Business for a podcast to talk about the security challenges and risks of ungoverned file sharing services. The post Breaking Bad: Cracking the User...

View Article

Controlling Content in the Digital Workplace 

The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace  appeared...

View Article

The Data Sovereignty Dilemma of the Digital Workplace

If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...

View Article


The Challenges of Data Sovereignty in the Cloud

The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...

View Article

Practicing Law Securely — Information Rights Management: What, When, How

Information Rights Management (IRM) is a capability that provides end-to-end control of a document — without impeding on collaboration and productivity. The post Practicing Law Securely — Information...

View Article


Control Study Documents in a Collaborative World

How Intralinks' information rights management technology helps sites keep complete control over documents during collaboration in clinical trials. Read the full piece on WorldPharma. The post Control...

View Article

Don’t Hedge Your Bets on Substandard Sharing Practices

The accessibility of data has made our lives easier, but there is room for improvement as far as security is concerned, especially for hedge funds. The post Don’t Hedge Your Bets on Substandard Sharing...

View Article


Striking the Balance Between Information Security and Usability

With growing business concerns around data security, privacy and compliance, here's how organizations can strike the balance between security and usability. The post Striking the Balance Between...

View Article

Industry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...

Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...

View Article

Practicing Law Securely — Working with Information Rights Management

Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...

View Article
Browsing all 68 articles
Browse latest View live