Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
A former CIO and author lays out the blueprint for how to disrupt old-school IT.
The FBI pointed to North Korea as the culprit behind the Sony Pictures security breach, and reports hint the foreign government may have gotten inside help. Also on Searchlight: Yahoo CEO Marissa Mayer's flawed attempts to channel Steve Jobs; Samsung takes on Apple Pay.
In this SearchCIO Startup Spotlight video, we ask Paydiant's Chris Gardner about how its mobile wallet technology works and about the biggest issue with mobile pay -- security.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Find out why detractors are wrong to judge BI platforms as technologically sophisticated, time-consuming and inflexible.
Patients take precautions as deficiency of EHR interoperability threatens their health.
Improved data compression and lower costs are two reasons more healthcare providers are weighing cloud deployment in their facilities.
VMware added a number of new features to its public cloud and rebranded it as vCloud Air in 2014, but the focus will still remain on hybrid in 2015.
From price wars and announcements to outages, there was a lot of cloud news to digest in 2014. Test your memory with our cloud quiz.
As cloud evolves, new applications such as big data analytics and HPC enter the fray. What do these new apps mean for cloud's future and performance?
Who needs security more than the government? Military man and network security pro, Brad Casey, talks certs and why sometimes, you just need to flip a switch.
You can't measure airflow from raised floor tiles in the same way as any other air duct. Optimize data center airflow with the right tools.
TIA data center standards address cabling systems with performance, budget and future plans in mind. New concepts bear consideration as well.
Consultant and author Craig Mullins discusses some of his rules of thumb for helping database administrators contend with an increasingly complex set of responsibilities and duties.
Author Craig Mullins discusses the evolving responsibilities of database administrators due to NoSQL systems and a growing need for mixed database management system environments.
The Internet of Things, the data lake and the "age of the customer" stole headlines this year. TechTarget editors explain why in this BizApps Today episode.
Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.
The investigative U.S. government agency said it found overlap between the malware and infrastructure used in the Sony Pictures hack and other North Korean operations.
News roundup: As it copes with a devastating, unprecedented cyberattack, Sony Pictures' future as a company could be on the line. Plus: "Operation Cleaver"; labeling HTTP websites "insecure"; and a surge in phishing with malicious links.