- May 02, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) By now, everyone in the world of information management is aware of the staggering increases in ...
- April 22, 2013
Social media has been buzzing of late about the House passage of CISPA, as opponents argue the cybersecurity bill is a huge hit to consumer privacy.
- April 22, 2013
In this Product Spotlight, learn about two global compliance services created to boost mobile productivity and enforce compliance for on-the-go employees.
- April 15, 2013
(This blog post was written by Marilyn Bier, chief executive officer of ARMA International.) Organizations depend on information to manage day-to-day operations, comply with regulations, gauge ...
- April 04, 2013
The global economy creates unique risks and regulatory compliance rules for multinational corporations, forcing them to re-examine GRC processes.
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- April 01, 2013
Ace Hardware Director of Risk Management William J. Montanez discusses the key aspects of, and obstacles to, a strategy for managing corporate risk.
- March 22, 2013
Microsoft this week became the latest big-name U.S. company to be investigated for bribing foreign officials and violating the Foreign Corrupt Practices Act. The U.S. Department of Justice and the ...
- March 14, 2013
President Obama met with high-profile business leaders this week to discuss how the private sector can work together on U.S. cybersecurity strategy.
- March 08, 2013
In this Product Spotlight, learn about new compliance monitoring tools to help financial institutions meet regulatory and data reporting requirements.
- February 22, 2013
U.S. cybersecurity -- or the lack of it -- was big news this week, as President Barack Obama's recent issuance of cybersecurity-related executive orders coincided with reports that China has ...
- February 18, 2013
In this Product Spotlight, learn how new DR/BC offerings from RSA and Continuum could benefit business priorities and compliance managers' strategies.
- January 31, 2013
One analysis found an uptick in breaches in 2012, but simple, organization-wide controls could be the key to maintaining data security and privacy.
- January 30, 2013
Technology law expert Jeffrey Ritter discusses the complications -- and benefits -- that arise from combining data governance and compliance processes.
- January 24, 2013
Business risk remains a top concern, so organizers of an upcoming conference promise real-world examples and expert tips on cutting-edge ERM strategy.
- January 18, 2013
In our latest Product Spotlight, learn how new mobile security offerings from Commtouch and Citrix can protect today's enterprise devices.