Week of 03 Feb 2014 What is mobile data GRC? Join our mobile data security discussion (04 Feb 2014)
What is mobile data, which devices produce it, and how can you protect it? Join SearchCompliance Feb. 20 to discuss mobile governance and compliance.
Week of 13 Jan 2014 GRC programs on the rise with data management complexity tides (17 Jan 2014)
Organizations have turned to GRC programs to avoid regulatory issues and keep data secure. But can these programs also benefit the bottom line?
Week of 06 Jan 2014 The best information governance framework? Discuss on Twitter Jan. 16 (06 Jan 2014)
What information governance framework best suits your organization? Chat about GRC with us on Twitter during SearchCompliance's inaugural tweet jam.
Week of 16 Dec 2013 Top 10 2013: Most popular governance, risk and compliance articles (20 Dec 2013)
In our Top 10 of 2013, read SearchCompliance's most-viewed compliance articles from the past year for advice on deploying a cutting-edge GRC strategy.
Week of 09 Dec 2013 New vulnerability assessment tools proactively detect security threats (13 Dec 2013)
Vulnerability assessment tools can help enterprises detect and eliminate security threats early on. Here are some of the newer products on the market.
Week of 18 Nov 2013 Q&A: Evolution of predictive coding technology in information governance (20 Nov 2013)
Predictive coding is often lumped in with e-discovery, but smart businesses are using it for other data management benefits. Learn how in this Q&A.
Week of 04 Nov 2013 New electronic document management software for the record manager (07 Nov 2013)
New electronic document management software offerings can give the record manager efficiency and security in integration and maintenance efforts.
In this Q&A with ARMA 2013 speaker Veeral Gosalia, learn how mobile devices and the cloud complicate how organizations approach e-discovery strategy.
Week of 21 Oct 2013 #Compliance: NSA data gathering results in foreign relations fallout (25 Oct 2013)
The controversy surrounding U.S.-based online surveillance continues, as more revelations concerning NSA data-gathering activities come to light.
Week of 14 Oct 2013 ISSA International Conference attendees talk whistleblowing and more (14 Oct 2013)
ISSA International Conference attendees talked whistleblowing, geolocation threats, real-time risk and more on Twitter during the Nashville gathering.
In this ISSA conference recap, we look at security roadmap development, identity systems, and the link between government and corporate cybersecurity.
In our latest Product Spotlight, we shine a light on secure file transfer services and systems that reduce risk and emphasize compliance.
Week of 23 Sep 2013 ISSA International Conference to spotlight latest cybersecurity trends (26 Sep 2013)
Organizers of next month's ISSA International Conference discuss what attendees can expect from the event and the current cybersecurity strategy landscape.
Week of 16 Sep 2013 Cloud security products to keep your risk management programs on track (16 Sep 2013)
In this Product Spotlight, we cover two new cloud security products designed to bolster enterprise risk management programs.
Week of 26 Aug 2013 #Compliance: NSA data gathering continues to inflame controversy (29 Aug 2013)
The online debate surrounding the NSA's data-gathering activities persists, as revelations surrounding the PRISM program continue to come to light.
Week of 12 Aug 2013 #Compliance: Online risk, cybersecurity make waves in gov't, industry (15 Aug 2013)
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.