Improperly Secured Data is a Serious Threat to CIOs and CTOs
This retention of data is causing problems for CIOs and CTOs. Ovum’s “Content is the New Perimeter” report shares the consequences of inadequate security. The post Improperly Secured Data is a Serious...
View ArticleLyft Claims Exec Lifted its Docs, Parked Them in Dropbox, and Drove Off?
The courtroom fight between Uber and its rival Lyft is a potential cautionary tale about mixing personal cloud applications with enterprise class solutions. The post Lyft Claims Exec Lifted its Docs,...
View ArticleThe Riskiest File Sharing Technologies
Employees need file sharing tools that enable productivity and facilitate communication. However, when ungoverned, these same applications risk data loss. The post The Riskiest File Sharing...
View ArticleGeneral Counsel Responsibilities of the Extended Enterprise
The role of the General Counsel has evolved considerably to include important risk management and business decision-making responsibilities. The post General Counsel Responsibilities of the Extended...
View ArticleCollaboristaBlog Roundup: The Best of 2014
From vulnerabilities to hacking methods and data leaks, to stronger techniques for information security and data privacy, 2014 was a year to remember. The post CollaboristaBlog Roundup: The Best of...
View ArticleElectronic Investigator Site File: The Solution for Disaggregated Industries
An electronic investigator site file (eISF) technology platform helps life sciences organizations efficiently operate in a disaggregated industry. The post Electronic Investigator Site File: The...
View ArticleFederal Regulator Implicated in Data Breach at California Credit Union
The regulatory issues financial services companies face may increase in 2015. The rules require that sensitive data be shared with examiners and agencies. The post Federal Regulator Implicated in Data...
View ArticleIntralinks VIA Brings Controlled Collaboration to Enterprise Content
Collaboration on content is critical for enterprises. With the latest update to Intralinks® VIA™, Intralinks expands its information rights capability. The post Intralinks VIA Brings Controlled...
View ArticlePracticing Law Securely — No More Attachments
How should lawyers be securely storing, transmitting, and sharing information? Here are some law information security best practices from Bob Blacksberg. The post Practicing Law Securely — No More...
View ArticleWhy Hackers Are Getting into the Espionage-as-a-Service Business
Espionage is typically connected with organizations backed by the governments of nation states. However, more private hacker groups are entering the scene. The post Why Hackers Are Getting into the...
View ArticleBreaking Bad: Cracking the User Controlled Content Sharing Habit in the...
Intralinks' Richard Anstey meets with Risky Business for a podcast to talk about the security challenges and risks of ungoverned file sharing services. The post Breaking Bad: Cracking the User...
View ArticleControlling Content in the Digital Workplace
The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace appeared...
View ArticleThe Data Sovereignty Dilemma of the Digital Workplace
If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...
View ArticleThe Challenges of Data Sovereignty in the Cloud
The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...
View ArticlePracticing Law Securely — Information Rights Management: What, When, How
Information Rights Management (IRM) is a capability that provides end-to-end control of a document — without impeding on collaboration and productivity. The post Practicing Law Securely — Information...
View ArticleControl Study Documents in a Collaborative World
How Intralinks' information rights management technology helps sites keep complete control over documents during collaboration in clinical trials. Read the full piece on WorldPharma. The post Control...
View ArticleDon’t Hedge Your Bets on Substandard Sharing Practices
The accessibility of data has made our lives easier, but there is room for improvement as far as security is concerned, especially for hedge funds. The post Don’t Hedge Your Bets on Substandard Sharing...
View ArticleStriking the Balance Between Information Security and Usability
With growing business concerns around data security, privacy and compliance, here's how organizations can strike the balance between security and usability. The post Striking the Balance Between...
View ArticleIndustry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...
Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...
View ArticlePracticing Law Securely — Working with Information Rights Management
Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...
View Article