Get DRM Security Insights

Recent Blog Posts

Document security needed for cloud transfers

January 17, 2012

Cloud computing has presented companies with myriad benefits. In terms of file transfers, it has made the task of sending and receiving documents much easier and more efficient. However, several security risks may go along with this practice, according to a recent IT Business Edge report.

Read More

Mobile workforce growth suggests need for greater document security

January 16, 2012

Researchers from IDC expect the global mobile workforce to reach 1.3 billion people by 2015, meaning that more employees than ever will need to access sensitive company information through smartphones and tablets. That suggests companies should be doing more with document security now to prepare for continued mobility growth.

Read More

How SMBs can best govern their data

January 13, 2012

Small and medium-sized businesses no longer differ much from larger enterprises when it comes to reliance on information. As a result, the time as come for SMBs to begin thinking like corporations in terms of governing and controlling the use of their data.

Read More

Employee theft represents significant document security threat

January 12, 2012

Providing employees with enhanced access to information can serve as both a gift and a curse for companies. On one hand, having information at their fingertips allows professionals to be more productive, but it also presents a serious security risk, according to a report from records management firm Iron Mountain.

Read More

Rise of cloud computing highlights need for access control

January 11, 2012

Among the top benefits of the cloud is the technology's ability to improve the access to hosted information. However, this may also be its greatest downfall if files and documents aren't secured properly.

Read More

Document security key when embracing self-service IT

January 11, 2012

A trend has been brewing for the past several years to place more IT capabilities in the hands of end users. However, when embracing this trend toward self-service, it's important that companies keep an eye on document security, according to a recent Computerworld report.

Read More

New defense budget calls for use of DRM

January 10, 2012

Most people think of digital rights management as a means for publishers to protect their content. However, the technology will soon allow the U.S. Department of Defense to protect its own sensitive information.

Read More

Security controls needed for BYOD programs

January 09, 2012

Many organizations today are realizing the productivity benefits that can be derived from a bring-your-own-device mobility program, but BankInfoSecurity recently argued that any practice also requires strict security controls.

Read More

Employee misuse poses high risk for companies

January 06, 2012

The control organizations have over the devices used by their employees is loosening with the rise of consumerization. As a result, employee abuse and misuse of data is among the top threats to information security, according to ZDNet contributor Adam Powers.

Read More

Spain passes landmark anti-piracy legislation

January 05, 2012

The national government in Spain recently approved the Sinde Law, which includes strict provisions aimed at preventing the sharing of pirated content in order to protect intellectual property.

Read More

Atari launches effort to protect intellectual property

January 05, 2012

It's been decades since Atari held a spot among the major players in the video game industry, but that doesn't mean the company will cease the protection of its intellectual property, Develop recently reported.

Read More

Information loss will cost U.S. economy nearly $300 billion

January 04, 2012

The loss of sensitive information is having a dramatic impact on companies across the nation, and if the problem is not solved, it will end up costing the U.S. economy $290 billion by 2018, according to report contributed to Forbes by industry expert Kevin West.

Read More

Protecting intellectual property must be top priority

January 03, 2012

When it comes to document protection, keeping intellectual property safe should be a top priority this year as threats to such information increase, according to a recent Channelnomics report.

Read More

Intellectual property theft is growing security concern

December 30, 2011

Organizations pour all they have into the work they produce and the innovations they are responsible for, which is why there's a widespread need for the protection of intellectual property. But according to a recent Channel Insider report, the problem may only get worse moving forward.

Read More

Mobile devices are security 'pain points'

December 30, 2011

Through mobile devices such as smartphones and tablets, employees enjoy access to information that was never before possible. For many organizations, government agencies included, this could translate into serious gains in terms of productivity, according to Government Computer News.

Read More

Business need to expand use of encryption

December 30, 2011

The need for encryption has grown as threats to enterprise information have become more sophisticated and widespread. In fact, tech news provider Technorati listed encryption among the areas that organizations should prioritize in 2012.

Read More

Over-sharing of documents will continue in 2012, expert says

December 29, 2011

In highlighting the top security trends for 2012, CNET contributor Elinor Mills said the over-sharing of sensitive documents will continue to plague organizations throughout the year despite the well-known effects of the practice.

Read More

Hyper-connectivity will cause document protection issues next year

December 28, 2011

Innovations of the information age have made it easier than ever to access and connect to all kinds of information. Moving forward, however, this will present myriad document protection issues for companies, according to CIO Update.

Read More

Expert: Document protection needed to combat industrial espionage

December 27, 2011

According to Bloor Research  IT security practice Nigel Stanley, industrial espionage has been around since the beginning of time - originating at the point when one person was seen to have a better idea than another.

Read More

Report identifies numerous types of insider threats

December 23, 2011

Unfortunately, a company's own employees are among its greatest threats when it comes to the security of information. Acknowledging this, a recent eWeek report identified various types of professionals and how each puts enterprise data at risk.

Read More