Get DRM Security Insights

Recent Blog Posts

Study: Government IT executives prioritize security

April 02, 2013

The government, like the private sector, is highly susceptible to evolving digital risks. For this reason, federal, defense and intelligence agencies are prioritizing document security initiatives to keep confidential resources protected in the age of adversity, according to a new study by Lockheed Martin.

Read More

Healthcare encryption strengthens document security

March 25, 2013

As with so many other industries, healthcare is continually fighting an uphill battle in an effort to minimize data breaches. While there are many tools that can be used to strengthen document protection and reduce digital vulnerabilities, encryption is among the most efficient and effective, according to an InformationWeek report.

Read More

Planning, gathering security intelligence

March 21, 2013

Security intelligence, or information regarding the evolving risk landscape, is a critical part of any document protection strategy, as decision-makers need to understand how resources are being accessed and used to safeguard them. The concept of security intelligence is rapidly changing, however, and executives need to develop unique plans to ensure confidential solutions are protected.

Read More

Clouds to be safer in future, experts say

March 18, 2013

Despite the proliferation of cloud computing, many skeptics believe the hosted environments are not secure enough to keep sensitive documents safe. Other pundits, however, think this will change in the coming years.

Read More

Study: SMBs not meeting PCI DSS

February 13, 2013

Small and medium-sized businesses, also known as Level 4 merchants, are not doing enough to remain compliant with payment card industry data security standards, according to a new study by ControlScan and Merchant Warehouse. The survey, which polled more than 600 companies, revealed that both online and brick-and-mortar SMBs are not placing enough emphasis on document protection.

Read More

Security initiatives must consider human factor

February 06, 2013

Data breaches can have devastating consequences for companies, as exposing sensitive information can lead to damaged reputations, lost customers and fines due to failure to comply with regulations. Decision-makers need to be proactive, not reactive, regarding these situations, as implementing advanced document protection strategies may help firms avoid breaches altogether, according to an FCW[...]

Read More

No security initiative is too complicated to tackle

January 30, 2013

While document security and encryption strategies are vital if organizations want to keep sensitive information away from outsiders, decision-makers need to understand the digital landscape if initiatives are to be effective. This received attention in a recent Dark Reading report, which found that some agencies claim deploying robust protective strategies is too complicated.

Read More

Canadian Government Loses Personal Information of Student Loan Borrowers

January 22, 2013

Human Resources and Skills Development Canada notified news sources a couple weeks ago that a hard drive with the personal information of 583,000 Canada Student Loans Program borrowers was lost in November. The portable device contained student names, social insurance numbers, dates of birth, contact information and loan balances of borrowers from 2000 to 2006. The device also included the[...]

Read More

Businesses need to plan future security strategies

January 15, 2013

Companies of all sizes need to stay on their toes as the digital landscape evolves and organizations increasingly use electronic records rather than traditional paperwork. According to a report by Symantec, decision-makers need to plan ahead so their document protection initiatives can support future growth.

Read More

Robust security tools lead to protected cloud environments

January 08, 2013

Cloud computing is quickly gaining momentum in the private sector, especially as bring your own device and other mobile initiatives continue to see brisk adoption. Unfortunately, many decision-makers are still slightly intimidated by the cloud and, as a result, reluctant to trust the technology's document security capabilities.

Read More

Minimizing breaches with monitoring procedures

December 18, 2012

Meeting the payment card industry's security requirements can be a challenge for organizations that don't take the proper precautions to keep highly sensitive information protected. Retail decision-makers, especially those at online-focused outlets, need to eliminate any security vulnerabilities by implementing advanced access management strategies that prevent unauthorized individuals from[...]

Read More

Mobile computing requires new security practices

December 11, 2012

As mobile computing strategies continue to take off in the private sector, decision-makers need to conduct thorough risk assessments to ensure document security projects are not jeopardized by next-generation technological initiatives. Unfortunately, many organizations are simply unprepared for the mobile phenomenon, according to a report by Dark Reading.

Read More

Planning ahead can minimize document security vulnerabilities

December 04, 2012

Although identity and access management projects can dramatically enhance document security, decision-makers need to ensure the processes are properly carried out, as blundered efforts can have significant negative side effects.

Read More

Study: SMBs have trouble keeping up with IT changes

November 27, 2012

Small and medium-sized businesses (SMBs) are constantly fighting an uphill battle in today's unpredictable economy. Since they don't have as many resources as larger firms, SMBs are finding it difficult to keep with with the constantly evolving technological landscape, according to a new study by SWC Technology Partners.

Read More

Insider threats may jeopardize document security

November 20, 2012

Keeping sensitive digital documents protected is a priority for many businesses, leading decision-makers to implement advanced security tools. Unfortunately, insiders go unnoticed even though they are often the culprits behind data breaches, according to a report by Dark Reading.

Read More

Passwords, encryption become more important for businesses

November 13, 2012

Protecting online resources is becoming increasingly important throughout the private sector, especially as companies around the world continue to use cloud and mobile computing technologies. While leveraging access and identity management tools can enhance document security, some firms are not emphasizing the proper use of these solutions.

Read More

Big data strategies require security

November 06, 2012

A survey at the recent IT EXPO conference revealed that analyzing and using big data can help companies improve overall performance and customer service. The study revealed that roughly half of attendees are either looking into how big data can help their organization, considering developing a strategy or already have one in place.

Read More

Advanced tools strengthen cloud security

November 06, 2012

Cloud computing is slowly reaching mainstream adoption in the private sector as companies try to enhance cost savings and overall efficiency as much as possible in today's economy. However, many decision-makers are still hesitant to adopt the solutions because of the perception that the cloud's document security capabilities are not optimal.

Read More

Report: Cloud security concerns threaten deployment success

October 30, 2012

Companies are turning to cloud computing more frequently than ever before in an effort to store mission-critical resources in safe, off-site environments. Unfortunately, many decision-makers are not placing enough emphasis on document security tools and practices and are unable to successfully implement the cloud without problems, according to a study by CipherCloud.

Read More

Keeping documents safe during the mobile era

October 25, 2012

Today's business world is no longer constricted by traditional bounds like desktop computers and phones. Instead, companies are adapting to the wireless work style to enhance performance and efficiency. While embracing to mobility can be beneficial, decision-makers need to understand where their sensitive documents reside and fully grasp the tools being used to keep them safe, according to a Help[...]

Read More