Financial services, SOX, HIPAA, Industry-specific compliance, PCI, E-discovery and compliance, Vulnerability assessments
Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.
Is your enterprise mobile app development strategy download-worthy? Discuss mobile app dev in our SearchCIO tweet chat Wednesday, Oct. 29, at 3 p.m. EDT.
Break out the champagne -- 2014 was a good year for IT executive pay, according to the latest TechTarget IT salary survey. Those on the receiving end say they had it coming.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Today's powerful business intelligence platforms can turn healthcare data into applicable analysis without intervention from data scientists.
Ahead of CHIME's 2014 Fall CIO Forum in San Antonio, speakers dish to SearchHealthIT about what's keeping them up at night.
Short wait times and affordable prices are two of the reasons patients are stopping into retail health clinics for minor afflictions or checkups.
DIY is good for remodeling a house, but it might not be right for your enterprise. Answering five questions can prevent your cloud from a DIY disaster.
VMware will offer a SaaS version of its vRealize management suite as the company looks to bolster its hybrid cloud services.
There are many considerations for building a private cloud, especially with a tight budget. Keep costs in check by carefully planning out hardware, capacity, storage and networking.
You can't depend on a building system to run the data center. Implement a BMS and a DCIM tool to monitor and predict system changes, tighten security and more.
Getting operations and development on the same page is a daily struggle. Choose the right DevOps tools, and you'll have Dev and Ops dancing at the company party.
Say no to CRAC and consider more selective data center cooling options. In-rack and in-row cooling systems are efficient and optimally dispel heat.
TechTarget editor Joe Hebert investigates the recent Oracle OpenWorld and JavaOne conferences in this episode of BizApps Today.
When Lehman Brothers failed in 2008, regulators and other banks had precious little data to gauge wider financial risks. Enter legal entity identifiers, a form of semantic data.
Brian McKenna joins the Talking Data podcast crew to look at differences in managing and analyzing big data as handled by IT shops in the U.K. and continental Europe.
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies.
The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.