Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
With Google's Allo, the tech giant is hoping you'll choose messaging smarts over privacy. Also in Searchlight: Yahoo confirms colossal breach; Oracle beefs up cloud offerings.
Understanding how a blockchain works is the first step in taking advantage of the technology. Learn how a blockchain unit of value moves from party A to party B.
Perkins School for the Blind launches a mobile app to help commuters with vision loss find bus stops. And it's not stopping there.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Consultant Nick Merkin explains why a lack of security awareness is a threat to protecting medical imaging systems and how organizations can educate staff to mitigate risks.
To protect medical imaging systems from breaches or attacks, hospitals should focus on cross-department cooperation and take a holistic approach to cybersecurity.
The internet of things has the potential to provide physicians with valuable data that can improve patient outcomes, but there are several barriers to IoT adoption in healthcare.
IT pros face a variety of options when it comes to managing OpenStack -- and those options vary, depending on whether they take a DIY or vendor-supported approach.
Oracle turns to bare metal and containers to craft an IaaS platform that's friendlier for enterprise scale-out, but is it compelling enough versus entrenched public cloud rivals?
Initially, organizations adopted multicloud as part of their risk mitigation strategy. But today, it's about portability, flexibility and so much more.
Learn how to use Btrfs snapshots with Linux utilities, such as Snapper and GRUB2, to revert back to previous states in the event of a configuration mishap.
In any multi-tenant IT environment, noisy neighbors can be an issue. Here's a closer look at how the challenges differ in the public cloud versus colocation.
Stand-alone servers are getting fazed out of data centers in favor of converged and hyper-converged systems. But not all legacy IT infrastructure is on its way out the door.
Alation Data Catalog provides business analysts and data stewards with search and discovery, governance and collaboration functionality, and automates many data governance tasks.
In a Q&A, EMA analyst John Myers advises IT teams to look at big data workloads when sorting through new and different types of databases and open source tools. His word on Spark? It's still young.
HPE is paring down its software holdings, including analytical database software in the Vertica line and other big data tools. A sale to Micro Focus is due to close next year, leaving users in some limbo for now.
Yahoo confirmed it was the victim of one of the largest mega breaches in history two years ago when information on at least 500 million user accounts was stolen.
A new FBI ransomware alert urges victims to report incidents to federal law enforcement, gives defense tips and urges victims to avoid paying a ransom, if possible.
Before using open source security software, enterprises should consider the security risks. Expert Mike O. Villegas discusses what to do before using open source software.