Financial services, SOX, HIPAA, Industry-specific compliance, PCI, E-discovery and compliance, Vulnerability assessments
Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
"Crossing the Chasm" author Geoffrey Moore has developed a framework on how to talk digital investments with the business: The Data Mill reports.
The Apple Watch offers nuggets of data that could drive employee productivity. We asked our readers to weigh in on the potential usefulness of the Apple Watch for business.
The platform business model develops and derives value from the ecosystem of users it connects. CIOs need to be in on it.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this podcast, Dan Bowden, CISO at University of Utah Healthcare, says mobile health security is a top concern and risk assessment is paramount.
A radiology professor recently demonstrated the medical implications of the Microsoft hologram technology, HoloLens.
In this video, SearchHealthIT visited Stanley Healthcare's Experience Center and got a peek at the company's emerging IoT in healthcare technologies.
Many organizations move to the cloud with dollar signs in their eyes. However, cloud cost savings aren't guaranteed for every enterprise app.
The cloud market continues to evolve, with many moves and developments. And as 2015 hits the halfway mark, here are five tips to brace for the future.
As cloud computing evolves, users won't just move their apps to the cloud -- they'll design them to take advantage of cloud's scale and resiliency.
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
Virtualization, rapid refreshes and shadow IT make it harder for IT departments to really know -- and properly license and support -- what they have. You need an IT asset management system to show you.
The increasing expectation for high quality content and the growth of IoT will be helped as edge computing brings nodes closer to end users.
SonarW is a columnar data warehouse built especially to handle JSON data. It can support data warehousing for MongoDB systems and some data lakes.
Hadoop data lakes offer an enticing location for large data sets. But consultant Andy Hayler says more examples of successful big data projects are needed to help boost their adoption.
Machine learning is a hot technology in analytics applications -- and it also underpins new data preparation tools that let business analysts and users integrate data for analysis.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.
Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done.