The results of Protiviti’s 2015 “Vendor Risk Management Benchmark Study,” conducted in partnership with the Shared Assessments Program, can be viewed as cause for optimism—or concern,... View More
CT TyMetrix, the premier provider of Web-based legal operations management solutions for corporate law departments and claims organizations, announced the launch of its Dashboard product, the flagship... View More
Records management is the effective and systematic control of an organization’s records, regardless of medium, through their entire life cycle–from receipt or creation until their final disposition.... View More
To quantify the cost benefits of predictive coding and technology-assisted review, Catalyst Repository Systems, Inc., the leader in secure, cloud-based e-discovery software that simplifies e-discovery... View More
Cybercrime targeting of commercial enterprises and organizations is rampant. Increasingly sophisticated, organized crime groups are gaining improper access to point-of-sale systems and corporate networks... View More
Kofax® Limited (NASDAQ: KFX) (LSE: KFX), today announced that Altosoft, a Kofax company and developer of business intelligence and analytics software, introduced Altosoft Insight™ 5.0. Insight... View More
Many of the comments I hear from executives regarding information governance planning include: \"We don’t want to boil the ocean.\" \"There are too many conflicting definitions.\" \"No one follows... View More
Surging adoption of social media isn't exactly a state secret. Facebook, Twitter, LinkedIn and other services can deliver compelling enterprise value connecting clients, partners and colleagues. Effective... View More
The rapid and voracious adoption of smartphones and tablets has universally changed employee expectations and has driven the \"bring your own device\" (BYOD) workplace phenomena. As Forrester Research... View More
Most organizations are critically dependent on technology to operate in the modern world. For these organizations, technology risk management often becomes a one-dimensional exercise: an obsession with... View More
Each e-discovery step overlaps with compliance objectives and involves many disparate groups of people, sets of data and parallel processes. This process is marked by collaborative problems, expanding... View More
Thinking about mobile security keeps me up at night. It probably keeps you up too. On a recent evening, I was browsing the findings of a study by McAfee and Ponemon Institute titled “The Lost Smartphone... View More
On September 19, 2008, Federal Rule of Evidence 502 (a.k.a. FRE 502 or Rule 502) was enacted to address the loud outpouring of complaints from litigants that the litigation costs required to protect against... View More
Catalyst Repository Systems, Inc., the leader in secure, cloud-based software powering global discovery for corporations and law firms, today announced a strategic alliance with Park IP Translations, a... View More
If you, like many other Americans, have ever secretly perused your child's Facebook account or sneaked a look into your spouse's email account out of curiosity or—perish the thought—out of... View More
Enterprise architecture professionals and records management professionals must be open to collaboration, cross-functional business and technical roadmap development and be willing to identify, explore... View More
Upland Software, Inc., a leader in cloud-based Enterprise Work Management applications, today announced that the latest version of its FileBound document and workflow automation application is now available.... View More
kCura announced the launch of Relativity 7. The release includes improvements to the review experience, enhancements for administrators and case managers, more tools for building custom applications, and... View More
IT risk is everyone’s problem. By “everyone,” we mean the board of directors, senior management, process owners and internal auditors. Internal audit departments play a critical role... View More