article thumbnail

Information Governance Pressure Points – 3 Common Areas of Failure

AIIM

Back in the day, when work was centralized in locations and on devices “within” the enterprise, it was reasonable to assume that control could most effectively be maintained by managing security at the firewall. Information security was largely a function of “keeping the bad guys out.”. Your friends here at AIIM can help.

article thumbnail

Building a Framework to Sustain the Coming IoT Tsunami – An Interview with Priya Keshav of Meru Data

Information Governance Perspectives

It is important for us to realize how our own lives are being altered by IoT every day. As end-users we are uniquely positioned to appreciate why this data needs to be managed securely. As end-users we are uniquely positioned to appreciate why this data needs to be managed securely.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building a Framework to Sustain the Coming IoT Tsunami – An Interview with Priya Keshav of Meru Data

Information Governance Perspectives

It is important for us to realize how our own lives are being altered by IoT every day. As end-users we are uniquely positioned to appreciate why this data needs to be managed securely. As end-users we are uniquely positioned to appreciate why this data needs to be managed securely.

IoT 40
article thumbnail

From identity provisioning to managing IoT ecosystems

OpenText Information Management

The pace … The post From identity provisioning to managing IoT ecosystems appeared first on OpenText Blogs. This is an exciting new world. At its heart lies a new generation of identity management technologies and mindsets.

IoT 45
article thumbnail

Why Are Businesses Opting for Edge, AI, and IoT – and Are They Wise to Do So?

ARMA International

Edge computing is increasingly associated with at least two “trending” terms in the IT and information arenas: Internet of Things (IoT) and artificial intelligence (AI). Morgran writes that “The gateway analyzes data at the edge, sending the meaningful information. back to the enterprise.”.

IoT 40
article thumbnail

GDPR and The Data Governance Imperative

AIIM

Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. Compliance with the accountability principle implies having better visibility to the data, how it is collected and processed and the steps taken to minimize the amount of personal information collected. Data Discovery.

GDPR 91
article thumbnail

Book Recommendation: Tomorrow’s Jobs Today authored by Rafael and Abby Moscatel via IG GURU

IG Guru

Rafael is a well-respected Information Governance Professional (IGP), Certified Records Manager (CRM), and Certified Information Privacy Manager (CIPM). Tomorrow’s Jobs Today is written by Rafael Moscatel and his spouse Abby Moscatel. Abby is a California trial attorney for State Farm Mutual Automobile Insurance Company.