Data Lifecycle Management: How to reduce risk

Data Lifecycle Management: How to reduce risk

The Data Lifecycle Management (DLM) goes through 5 steps: creation, usage, transport, storage and destruction. Most companies have parts of this lifecycle under control, but that means there are lots of areas for gaps in the control measures that could let a threat...
Data Lifecycle Management: How to reduce risk

Privacy Considerations in a Web 2.0 World or web 3.0 World

Privacy is all about protecting the rights of the client from unauthorized disclosure or use of their PII. (Personally identifiable information) Take the example of a process that receives an input from a data feed that contains PII. This information is processed and...
Data Lifecycle Management: How to reduce risk

What are the challenges with protecting electronic documents?

We have seen a lot of problems with Adobe vulnerabilities. Adobe has been getting beat up with all the negative publicity in the past few months. Apple is restricting access to Adobe on their devices. Has anyone tried their remote desktop sharing? I wonder if some...