Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Compliance Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Does your organization know what to look for in order to hire the right information technology talent? Discuss the IT skills gap in our SearchCIO tweet chat Wednesday, Aug. 27, at 3 p.m. EDT.
Heartbleed resurfaces in a Tennessee health system's breach, and UPS customers' data is in danger. Is assuming the worst enough? Also in Searchlight: Steve Ballmer signs off from Microsoft's board; Twitter, Facebook tinker with more experiments.
Who is the chief data officer, really? Four CDOs describe their first 90 days, their primary objectives and their biggest mistakes at a recent symposium.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A New Jersey urologist and athenahealth customer negotiates the meaningful use stage 2 attestation maze without undue pain.
After Cerner's $1.3 billion acquisition of Siemens' health IT unit, Cerner users already familiar with Siemens see the two companies' systems moving toward integration.
Dermatologists and radiologists should take notice of Microsoft's recent Project Adam announcement of artificial intelligence that specializes in visual recognition.
Is it true that if you don't use it, you lose it? When it comes to the cloud, enterprises are buying excess capacity at lower prices. David Linthicum discusses whether the extra cloud capacity is being maximized.
OpenStack is close to doing its victory lap in the private cloud race -- but not so fast. There are three emerging trends in the cloud market that could become threats to OpenStack's position.
Combining the Internet of Things and cloud services could build an IT superpower. With its infinite capabilities and security enhancements, it'd be hard to find its kryptonite.
Data center equipment refreshes are expensive and time-consuming, but there are ways to ease the most arduous steps of the IT lifecycle -- and possibly even make a little money.
Remote KVMs represent both convenience and potential for disaster. A few simple security steps can prevent downed servers, whether from an intentional attack or a simple miscommunicated update.
Make sure you know what is significant about the mainframe. Take this quiz to find out what you should brush up on.
Despite finding their way into Gartner Magic Quadrant reports, vendors of NoSQL databases are still in the early-adopter stage with users. Is there a need for NoSQL software in your organization?
Consultant William McKnight talks about the potential uses of in-memory databases and the processing benefits they can provide to organizations.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.
The difficulty of detecting Heartbleed exploits means that the Community Health breach is unlikely to be the last incident linked to the OpenSSL flaw.
News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.