- July 13, 2012
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.
- June 29, 2012
In this Q&A, law and technology expert Jeffrey Ritter discusses the heightened importance of corporate information governance and how companies should adapt to the trend.
- June 25, 2012
Analyst Chris McClean discusses the chief compliance officer's role as risk management and compliance are increasingly tied to business success.
- June 22, 2012
Are you prepared for the inevitable? Odds are it's merely a matter of time before your business experiences a computer security-related breach and you need a solid data breach response plan. How ...
- June 18, 2012
As organizational data proves invaluable, protecting it becomes more vital, so compliance departments can expect a bigger voice in business strategy.
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- June 12, 2012
In the corporate world, keeping track of compliance mandates can be a challenge. Here's how technology can help with regulatory compliance management.
- June 08, 2012
Our latest compliance product roundup spotlights regulatory compliance management solutions recently released by MetricStream and RSA Security Management.
- June 08, 2012
When moving data to the cloud, you're still responsible for adhering to regulations. Proper planning can ensure cloud computing data security is not an oxymoron at your company.
- May 31, 2012
Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.
- May 29, 2012
Remember the law of inertia from physics class? It says that a body at rest tends to remain at rest unless acted upon by an outside force. Well, compliance is the law of inertia-type catalyst when ...
- May 21, 2012
Technology law expert Jeffrey Ritter discusses how bring-your-own-device programs, cloud use and vendor relationships should influence your data protection strategy.
- May 14, 2012
Advanced technologies create more data than ever for companies to protect, but it's not all bad news. Here's why using the latest cutting-edge tools can help your GRC strategy.
- May 14, 2012
The GRC technology market has become increasingly targeted but companies' buying decisions have not followed suit. How can you make sure you're getting the most bang for your buck?
- May 08, 2012
If you look at news headlines, you’d think the sky were falling with all of the hack attacks and subsequent data breaches taking place. Just glancing at the Chronology of Data Breaches says it all. ...
- May 07, 2012
Technology law expert Jeffrey Ritter discusses the obstacles to governing social media security in 21st century business and what companies can do to protect their information.