Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
A bimodal IT strategy should be seen for what it is: a way to transition from the old to the new world of business, according to Derek Roos.
Who owns IoT data? The more pertinent question raised by the evolution of IoT is what does humanity look like in an IoT age, says Harvey Koeppel.
"Digital ecosystem" was the catchphrase at this year's MIT Sloan CIO Symposium. To vie as competitors, companies need to play by a new directive: Share or be left out.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Learn how providers can conserve their resources by using healthcare bots for administrative duties such as appointment scheduling, billing and processing payments.
It's no secret that EHR problems are aplenty in healthcare. But the lack of interoperability is top of mind for many in health IT. Two healthcare CIOs share their stories.
Patients should freely and openly share health data so that data breaches won't matter, CIO John Halamka says. He also believes that choice should be up to each individual.
Network security groups control the lines of communication between network traffic and cloud instances. How do I set them up in AWS or Azure?
New PaaS offerings have put their best foot forward in terms of container orchestration and management, which has attracted a new generation of IT ops pros.
Direct connections, such as those from AWS and Azure, can put data on the fast track to the public cloud. But organizations should be ready to pay a price.
The most common data center operating system gets its final 6.x updates with the addition of a local backup archiving tool before transitioning to just security and stability updates.
Among other benefits, edge computing -- a critical component for many IoT applications -- can boost performance and enhance security. But it isn't without its challenges.
Despite its critical role in cloud application performance, the enterprise CPU is often overlooked. Learn about next generation hardware, and why it's important to cloud.
SAS Data Governance provides organizations with data governance tools for organizing, managing and accessing their data assets, and establishing enterprise-wide data policies.
New cloud apps seem ready-made for NoSQL. This may cause Oracle to put more focus on its Oracle NoSQL database, which is often overlooked amid a crush of NoSQL contenders.
In an interview, consultant Lakshmi Randall foresees changes in how data management is organized and executed as the overall data landscape shifts due to the adoption of big data systems.
Latentbot malware has layers of obfuscation that makes it hard to detect. Expert Nick Lewis explains how its process works, beginning with a phishing email, and how to stop it.
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and how to mitigate attacks.
Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.