- July 11, 2011
The focus for compliance officers has shifted to fostering the development of an ethical corporate culture. But there are obstacles to promoting ethical behavior in a business setting.
- July 07, 2011
There’s one big problem for IT departments seeking guidance related to PCI DSS 2.0. The best advice, as Payment Software Co. principal Tom Arnold points out, is often "it depends." That makes it ...
- July 05, 2011
Companies need an effective way to mitigate the risks of increasingly ubiquitous social media. But establishing a solid corporate social media policy is no easy task.
- June 20, 2011
Most people associate the term forensics with security or law enforcement. However, the concept of forensics and forensics technology lends itself very well to compliance. Adhering to compliance ...
- June 10, 2011
Social media use by businesses and their employees is on the rise, and with good reason -- social networking tools can easily help companies reach millions of new customers. New information, ...
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- June 03, 2011
High-profile data breaches earlier this year captured the attention of both corporations conducting online business and the legislators charged with overseeing key Internet privacy laws and ...
- June 02, 2011
As regulations increase, more compliance organizations and professionals are seeing the value of social networking tools to share information on regulatory compliance services.
- May 31, 2011
Our latest roundup of IT products features a social network monitoring solution from SocialLogix and OpenLogic's Software as a Service solution for open source compliance.
- May 25, 2011
How compliant are you? That is one of the first questions a newly minted compliance manager should ask themselves about their businesses and associated procedures. Nevertheless, many assume that a ...
- May 20, 2011
HiSoftware chief technology officer Thomas Logan discusses under-the-radar -- but common -- data security and privacy lapses that cause compliance risks for many organizations.
- May 19, 2011
In the need for some IT training? Check out our list of GRC conferences designed to help your enterprise stay current with the latest compliance regulations and GRC strategy trends.
- May 16, 2011
Compliance affects numerous technologies in the enterprise. Many compliance officers already know this and strive to make sure that data is properly protected, secured, audited and archived. ...
- May 13, 2011
Recent data breaches have made online consumer privacy a priority. The federal government is now attempting to take action that includes introducing "do not track" legislation.
- May 06, 2011
Lexmark is looking to prove that compliance strategy and productivity are not mutually exclusive concepts. The company is launching three new back-office solutions under the guise that automation, ...
- May 06, 2011
After a cyberattack put Sony's protection of personal information under a microscope, the company has announced increased security measures and enhanced customer data protection.