Articles

News of data breach occurrences appear on an almost daily basis, frequently involving embarrassing leaks of credit card data, email addresses, names, phone numbers, physical addresses, and financial transactions. The consequences can result in significant fines, reputational damage, legal claims and expense and even imprisonment.

Once upon a time, a Shire not too far from Melbourne analysed its paper usage and was horrified to find that if each sheet of paper it used was placed end to end it would be the equivalent to the travelling the distance between Melbourne and Sydney (the scenic route) and a little bit more.

When presented with a digitally signed document, most will probably just accept it at face value. The more technically minded will validate the signature, which confirms that the signature is unaltered, and that is signed by a Certificate which we trust. This means that the Certificate is signed by another Certificate, and so on up the chain until we reach a trusted root – a self-signed Certificate which we consider trusted and have in our KeyStore.

Every organisation is now a digital business. Its information is an asset and its digital currency. Business leaders responsible for managing enterprise information have to focus on its life cycle, which is extremely critical for the success of the business.

Kira Systems, the machine learning contract analysis software provider, has announced Kira Quick Study 2.0, a major upgrade to its proprietary technology that identifies clauses and other metadata from contracts and related documents.

Pages