Quantcast
Channel: NSA – Intralinks CollaboristaBlog
Browsing latest articles
Browse All 10 View Live

Preserving Data Privacy: Where Should You House Your Data?

The prevalence of cloud computing, cloud-based storage and collaboration products only emphasizes these concerns. Many organizations are confused about regulations that protect data in different...

View Article



Stopping the Edward Snowden in your Organisation

In the eyes of some, NSA whistleblower Edward Snowden is a hero who leaked information about top secret state-sponsored surveillance operations to journalists, stoking a global debate on privacy. But...

View Article

Where is Data Governance Headed?

Data governance in the cloud is an emotional topic. There are a wide range of opinions when considering the impact of regulations, data sovereignty, the NSA and the Patriot Act. The post Where is Data...

View Article

Why It Matters Where You House Your Data

Businesses have legal and ethical obligations to protect information in one jurisdiction and legal requirements to turn that information over in another. The post Why It Matters Where You House Your...

View Article

Cyber Security Framework: Does Your Company Comply?

Stepping up security against cyber-attacks makes perfect sense considering all of the data breaches that have occurred , like Target, Neiman Marcus, etc. The post Cyber Security Framework: Does Your...

View Article


How to Protect Your Business Information in the Age of the NSA and PRISM

Information sharing should bring concerns for businesses around how to effectively secure the data being shared from the NSA-like government. The post How to Protect Your Business Information in the...

View Article

Does the NSA Have Plans to Infect Millions of PCs with Malware, or Not?

If you who must disclose information with organizations, make sure they have security protocols in place to protect data privacy in the age of the NSA. The post Does the NSA Have Plans to Infect...

View Article

Secret Surveillance Programs of the NSA: Is Your Data Private?

Submerged in secrecy, the NSA has a prolonged past of gathering intelligence for security, foreign relations and other national security motives. The post Secret Surveillance Programs of the NSA: Is...

View Article


Why DRM and Customer managed Keys are Important for Information Security and...

DRM coupled with customer-managed keys (CMKs) in a HSM device allows users to have control over their data and facilitate compliance with regulations. The post Why DRM and Customer managed Keys are...

View Article


Congress and High Tech Vendors Move to Block NSA Data Snooping

The U.S. House passed an amendment for curbing two activities of the NSA. The vote comes as welcome news to high tech vendors concerned about data privacy. The post Congress and High Tech Vendors Move...

View Article
Browsing latest articles
Browse All 10 View Live


Latest Images