Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
For mobility expert and entrepreneur Bryan Barringer, sitting on a wallet all day is a real pain in the backside. The mobile wallet represents a new and improved way to pay.
Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.
In this video interview, 2015 MIT Sloan CIO Leadership Award winner Michael Nilles discusses why a company-wide effort is needed for enterprises seeking successful digital transformation.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The Internet of Things opens many doors in healthcare. But paired with data analytics, IoT in healthcare would be even stronger.
In this podcast, Dan Bowden, CISO at University of Utah Healthcare, says mobile health security is a top concern and risk assessment is paramount.
A radiology professor recently demonstrated the medical implications of the Microsoft hologram technology, HoloLens.
Many organizations move to the cloud with dollar signs in their eyes. However, cloud cost savings aren't guaranteed for every enterprise app.
The cloud market continues to evolve, with many moves and developments. And as 2015 hits the halfway mark, here are five tips to brace for the future.
As cloud computing evolves, users won't just move their apps to the cloud -- they'll design them to take advantage of cloud's scale and resiliency.
I deleted a partition on my Linux system, but I still see a boot menu. How do I re-install GRUB2 and not lose data?
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
Virtualization, rapid refreshes and shadow IT make it harder for IT departments to really know -- and properly license and support -- what they have. You need an IT asset management system to show you.
SonarW is a columnar data warehouse built especially to handle JSON data. It can support data warehousing for MongoDB systems and some data lakes.
Hadoop data lakes offer an enticing location for large data sets. But consultant Andy Hayler says more examples of successful big data projects are needed to help boost their adoption.
Machine learning is a hot technology in analytics applications -- and it also underpins new data preparation tools that let business analysts and users integrate data for analysis.
Controversial Italian surveillance software firm Hacking Team was attacked, resulting in a 400GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.
A HIPAA audit covers privacy compliance, and organizations need to be prepared. Expert Mike Chapple discusses privacy in the audits.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.