Financial services, SOX, HIPAA, Industry-specific compliance, PCI, E-discovery and compliance, Vulnerability assessments
Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A blast of new products and educational presentations at HIMSS 2014 highlighted some impressive trends in the growing mHealth market.
An update to the CLIA gives all patients access to their lab results to further patient involvement in care.
At Children's Medical Center of Dallas, CIO Pam Arora sees health information exchange making a real difference for kids with sickle cell anemia.
Google will throw down the gauntlet for Amazon Web Services this year with new two new features in Google Compute Engine, industry sources said.
VMware's vCloud Hybrid Service ramps up with more to come, as the company seeks to integrate private and public clouds for enterprise workloads.
A new Cloud Foundry foundation provokes debate about the fate of OpenStack-based PaaS efforts.
OpenLDAP configuration isn't for the faint of heart. LDAP pros weigh in on what you should and shouldn't do when deploying the directory server.
Server refresh cycles can be more nuanced than a rip and replace of used servers. Consider these options for longer server lifecycles.
When a process fails, go for the kill. You know how to start and stop Linux services, but what happens when you need to kill one?
Enlist senior-level champions from both business and IT to guide a data governance program and achieve harmony between the two sides.
Organizations should meet a few key program development goals prior to implementing an MDM initiative, according to MDM expert Anne Marie Smith.
Highlighting the benefits of an MDM program from both technical and business perspectives is essential to gaining support for funding.
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
Expert Nick Lewis details how the Tilon malware strain utilizes a unique communication protocol with its C&C infrastructure.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods.