June 21, 2018

Will Digital Transformation Destroy the Concept of Content?

Data replaces content and business processes rely on capture and automation channels. An information security example: authorization through secure sign-on, rather than a signature.
September 4, 2017

The Four Corners of Executive Support for Information Security and Governance

Champions now, partners later: Why you need to get the support of the CISO, GC, CIO, and COO if you’re going to put in place a successful IG program.
April 10, 2017
Clean Up Content for Information Security

Clean up Your Content Repository for Better Information Security

Content cleanup means purging it of unnecessary items and appropriately archiving the ones that are necessary to your business. Doing so allows you to reduce your overall unstructured data footprint -- i.e. leaving you with less junk and stale data to distract you, as well as less sensitive data to protect, thereby reducing the overall risk posed by your unstructured data.
September 16, 2016
Information Security Trends 2018

What the Business World Needs Now: A Practical Guide to Information Governance

KRM's "Information Governance: A Practical Guide" offers a methodology that you can use to implement information governance in your own organization, toward the “active and controlled handling of data and information."