Author: hello@tarasovs.me

NCRIC Achieves Mission Critical Information Sharing

NCRIC centralizes the intake, analysis, and distribution of criminal and homeland security intelligence for approximately 300 organizations, encompassing 15,000 users. Providing their users with on-demand, real-time, secure access to sensitive information is the core of their mission, and also their biggest challenge. “Resilient helped us achieve our mission critical goal of

How to Target Security in Your ECM

How to Target Security in Your ECM Role-Based Access Can Simplify and Strengthen ECM Security Congratulations—your organization has adopted a much-needed, corporate-wide mandate to implement an Enterprise Content Management (ECM) system. Your mission, which you are happy to undertake, is to deal with all the issues that you face everyday

Protecting Privacy: Easy as PII?

Protecting Privacy: Easy as PII? Psssst! Can you keep a secret? This simple childhood whisper magnifies an importance in the growing awareness of how organizations maintain the confidentiality of information they receive from individuals. The electronic world overflows with countless bytes of personal information. Online, people input all types of

Law Enforcement Information Sharing Panel at IJIS Symposium with Resilient, Regional Information Sharing Systems and Symantec

We are very excited to be part of an expert panel at the IJIS Institute’s National Symposium. Title: Balancing security, convenience and mission success: A path forward for information safeguards and sharing through Identity ManagementWhen: January 20th, 2016Where: Crystal Gateway Marriott in Arlington, VATime: 4:20-5:20pm, Salon J, Track 2 Creating the right safeguards to be

From Clutter to Classification

From Clutter to Classification Using IG to Gain Control of Your File Shares Rarely is chaos planned.  Cleaning up that same chaotic mess is rarely a planned activity.  The overgrowth of file shares is a story that is repeated at almost all organizations. Folders created with unclear names and documents

How Do You Eat the IG Elephant? One Bite at a Time!

How Do You Eat the IG Elephant? One Bite at a Time! A Practical Approach to Information Governance Design A lot of people who need information governance put it off because the task seems so overwhelming. But achieving a well-designed and manageable information governance solution is not as daunting as

Turning IG into ROI

Turning IG into ROI Making Information Governance Analytics Pay Off It’s no secret that the divisions of a company that contribute to the corporate bottom line drive the company’s business decisions. Efforts to devise and enforce compliance to information governance (IG) may be seen as merely “gate-keeping,” but turning IG

The OPM Data Breaches – Doing Business in a Zero Trust Environment

The data breaches at the OPM have significant ramifications for the government and for the millions of us that may be negatively impacted in the future. However, breaches present a unique impetus to drive much needed change in policies, technologies and monitoring. It has been reported that the breach was