Financial services, SOX, HIPAA, Industry-specific compliance, PCI, E-discovery and compliance, Vulnerability assessments
Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Harvey Koeppel understands how hard it deliver ITSM support for a digital business world. Here are seven ways to ensure you can follow the new ITSM roadmap.
Traditional ITSM support doesn't cut it in a digitally enabled and digitally disrupted marketplace. In part one, Harvey Koeppel describes the problem. Go to part two for the remedy.
Audio equipment maker Bose's CIO plus members of the development team offer up five tips for making the move from the Waterfall development methodology to Agile.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
RSNA 2015 spotlights radiology innovation in cloud, analytics and 3D printing, said Rasu Shrestha, M.D., chair of the RSNA Scientific Program Radiology Informatics Subcommittee.
PatientKeeper, an EHR overlay software platform owned by hospital chain giant HCA, aims to simplify physician workflow and boost EHR usability for doctors.
Many were fearful of the switch from ICD-9 to ICD-10, however, it seems there have been few problems. Two industry sources explain what they're hearing on the issue.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
A timeline of HP through the years shows the defining moments that ultimately led to the split into HP Inc. and Hewlett Packard Enterprise.
After a few humdrum years, server architectures are in for big changes to close out the decade.
Now more than ever, data centers need creative employees to adapt and outwit problems for a more efficient, reliable IT infrastructure.
A pivotal magazine article helped point medical doctor Parsa Mirhaji along a path to a semantic data lake for healthcare analytics applications, using Hadoop, RDF, graph databases and more.
Big data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology.
IBM's planned purchase of The Weather Co.'s data operations may be a bellwether event from which data professionals can learn.
Samy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept.
The latest version of Google's mobile operating system addresses some key enterprise security concerns. Expert Michael Cobb explains what's new in Android M.
The NIST has changed its recommendations on random number generation for cryptographic keys. Expert Michael Cobb outlines the changes and explains why they were made.