Failure to apply the right security and compliance controls and tracking to sensitive content communications results in higher risk. Private content networks can help with compliance and privacy to prevent...
Is your organization’s data secure? If so, can you clearly demonstrate your security practices to auditors? Data privacy and data security is very important. In our previous posts, we identified...
The General Data Protection Regulation, or GDPR, was developed to bring legal unification and clarity to the protection of EU citizens’ personal data. Many organizations, however, are unaware of how...
FedRAMP for the private sector enables commercial business to take advantage of cloud solutions that the U.S. Federal Government has certified to provide rigorous security controls, as this post explains....
Significant disruption in the banking industry is forcing traditional banks to rethink how they provide services to consumers. Inevitably, secure file sharing in banking must also be revisited. Since the...
GDPR Compliance is going to be an ongoing challenge for IT organizations around the world. What is the GDPR, and why is GDPR compliance so important? We live in a...
New mobile and cloud technologies present law enforcement with new opportunities to capture and communicate Criminal Justice Information (CJI), potentially speeding investigations, building better cases, and demonstrating CJIS compliance. By...
Healthcare data breaches, and HIPAA compliance violations from those data breaches, are increasingly common. That’s one of the stark conclusions from the Ponemon Institute’s sixth annual study on the state of security...
Update: The Kiteworks (formerly Accellion) platform became FedRAMP-Authorized in June 2017. To learn more about Kiteworks and FedRAMP compliant file sharing, please visit our FedRAMP page. The Kiteworks secure file...
Real estate isn’t the only kind of business where location matters. Since Edward Snowden revealed the extent of the U.S. government’s spying on private citizens, data localization or data sovereignty has been...
A lost or stolen laptop, tablet, or smartphone can complicate a healthcare data breach, as a recent story from Texas makes clear. The thief who burglarized the headquarters of Sunglo Health...