Enterprise Content Management
If you’re considering starting a Data Governance initiative, you may be wondering what the first six months of work might look like - and that is a very good question because it is challenging… and even though I have done it many times before, sometimes it still surprises me exactly how involved and challenging those first few months can be!
IT research and advisory firm Info-Tech has published its "Assess Infrastructure Readiness for Digital Transformation" blueprint which highlights factors organizations should consider to unlock the full potential of their infrastructure with a digital transformation strategy.
The number 1 most frequently cited roadblock to adoption of Generative AI (GenAI)is concern about releasing the organization's proprietary content into the large language models of GenAl technology providers, according to a just published IDC report.
AUCloud has partnered with managed services provider LexVeritas to launch LexCloud, Australia’s first dedicated sovereign cloud solution designed for Australian law firms.
The Office of the Australian Information Commissioner (OAIC) has shown how it will use its new information gathering powers provided under new legislation in 2022 to target organisations that fail to report data breaches within 30 days.
Ground Labs has announced the release of GLASS which simplifies the creation and deployment of custom data patterns for Enterprise Recon, Ground Labs' flagship data discovery and management solution.
Microsoft has announced a series of enhancements to Priva, its platform for identifying personal data and critical privacy risks in M365, including closer integration with Purview Compliance Manager.
New Zealand's Computer Emergency Response Team (CERT NZ) has joined with the country’s National Cyber Security Centre (NCSC), the first step in creating a lead operational cyber security agency, similar to those in Australia, the UK, and Canada.
Britain’s National Cyber Security Centre (NCSC) has warned that organisations should be wary of integrating artificial intelligence-driven chatbots into their businesses due to potential security risks.
Malicious code is becoming increasingly common to find, both for traditional IT software as well as for OT, IoT and other embedded and unmanaged devices. Malicious actors are targeting public exploit proofs-of-concept (PoCs), typically porting them into something more useful or less detectable by adding payloads, packaging them into a malware module or rewriting them to run in other execution environments.
Pages