Financial services, SOX, HIPAA, Industry-specific compliance, PCI, E-discovery and compliance, Vulnerability assessments
Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Aiming for organizational agility? Prepare to change how you scope work, structure teams, develop talent, practice leadership, and deliver and sell your products.
Our 2015 IT salaries survey reveals the average pay for IT pros in the U.S., broken down by role and region of the country, job aspirations, optimism levels, and key tech projects.
As senior IT leaders sought to adapt IT strategies to a rapidly changing, digitally connected marketplace, one thing that didn't change in 2015 was their pay.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A revenue cycle executive passes on six best practices from a series of EHR rollouts that were designed to soften risks to the organization's billing processes.
The pediatrics specialty faces many unique challenges when it comes to caring for patients. A panel of experts believes big data can help, including with rare diseases.
Many fear cloud computing in healthcare. But a long-term care company disputes that stance, instead going 100% into the cloud while firmly believing it complies with HIPAA.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
Now more than ever, data centers need creative employees to adapt and outwit problems for a more efficient, reliable IT infrastructure.
I have 80 Windows servers in the data center. What can I use for daily event log monitoring?
Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security.
A pivotal magazine article helped point medical doctor Parsa Mirhaji along a path to a semantic data lake for healthcare analytics applications, using Hadoop, RDF, graph databases and more.
Big data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology.
IBM's planned purchase of The Weather Co.'s data operations may be a bellwether event from which data professionals can learn.
Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes.
The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies.