Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Make way for DevSecOps. According to Gartner analyst David Cearley, CIOs need to add security professionals to their DevOps teams.
The number of mobile devices now outnumbers the number of people in the world. Mass mobilization calls for next-generation security tools and some forward thinking on the part of CIOs.
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A funding opportunity from the ONC and HHS will give out $28 million in awards, spread out among as many as 12 state HIEs.
The ONC published a draft of its interoperability plan that delineates stages and targets for healthcare professionals to hit over the next decade.
Universal applications, built to work on different mobile devices, could have a future in healthcare. Find out when and where they might pop up.
Cloud brokers connect a growing landscape of service providers with busy business users. But what impact would they have on my IT team?
While AWS Config looks like another home run for the cloud giant, that doesn't mean everything is perfect. So where does AWS need to improve?
Cloud orchestration is gaining traction -- but how does it differ from provisioning? Expert Tom Nolle suggests thinking of one process as walking and the other as dancing.
Most of the IT budget goes to maintaining the data center hardware and software. Consider outsourcing for better support.
What's the difference between a nano server and a PC? Timing.
What's the impact on I/O when you run in a CPU-constrained mainframe environment?
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.
Building and running enterprise Hadoop applications takes more than data crunching. First, Hadoop data must be absorbed into company processes, a Western Union IT manager says.
According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.
Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk.
Medical device security is a growing concern. Expert Mike Villegas shares how to make sense of the new FDA cybersecurity guidelines for medical device manufacturers.