- August 10, 2012
Data management and security could create huge problems in our increasingly-connected world, as two recent events have made evident: Earlier this month, a Knight Capital computer program unleashed ...
- August 01, 2012
In this Q&A, consultant and auditor Paul Kirvan discusses what you need to consider when developing a business continuity and disaster recovery plan.
- July 26, 2012
Despite an IT consumerization influx, some organizations leave something to be desired when it comes to mobile device security, our survey found.
- July 23, 2012
In this Q&A, technology law expert Jeffrey Ritter discusses how companies can overcome e-discovery strategy's lack of clear regulation and direction.
- July 13, 2012
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- June 29, 2012
In this Q&A, law and technology expert Jeffrey Ritter discusses the heightened importance of corporate information governance and how companies should adapt to the trend.
- June 25, 2012
Analyst Chris McClean discusses the chief compliance officer's role as risk management and compliance are increasingly tied to business success.
- June 22, 2012
Are you prepared for the inevitable? Odds are it's merely a matter of time before your business experiences a computer security-related breach and you need a solid data breach response plan. How ...
- June 18, 2012
As organizational data proves invaluable, protecting it becomes more vital, so compliance departments can expect a bigger voice in business strategy.
- June 12, 2012
In the corporate world, keeping track of compliance mandates can be a challenge. Here's how technology can help with regulatory compliance management.
- June 08, 2012
Our latest compliance product roundup spotlights regulatory compliance management solutions recently released by MetricStream and RSA Security Management.
- June 08, 2012
When moving data to the cloud, you're still responsible for adhering to regulations. Proper planning can ensure cloud computing data security is not an oxymoron at your company.
- May 31, 2012
Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.
- May 29, 2012
Remember the law of inertia from physics class? It says that a body at rest tends to remain at rest unless acted upon by an outside force. Well, compliance is the law of inertia-type catalyst when ...
- May 21, 2012
Technology law expert Jeffrey Ritter discusses how bring-your-own-device programs, cloud use and vendor relationships should influence your data protection strategy.