Evaluating compliance software and solutions News
June 01, 2016
Office 365 compliance problems vary, according to the nature of the Microsoft services that companies use. Shawn Shell explains.
November 19, 2015
TechTarget 2015 Annual Salary and Careers Survey: Out of the myriad of security responsibilities for an enterprise, IT risk management and regulatory compliance occupy the most time.
July 06, 2015
Honda has revamped its regulatory compliance reporting processes after information technology failures led to record fines for TREAD Act violations.
April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
Evaluating compliance software and solutions Get Started
Bring yourself up to speed with our introductory content
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
Attending a GRC conference can keep you up to speed on compliance regulations, risk management strategies and governance trends. Check out our list of upcoming GRC conferences. Continue Reading
Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Evaluating compliance software and solutions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Along with the hype, there have been plenty of questions around blockchain technology, particularly regarding its security. A panel of blockchain experts takes on these concerns. Continue Reading
Is the Compliance with Court Orders Act draft bill the first step to mandating that tech companies allow access to their products' encrypted communications? Continue Reading
In part one of this blog post, John Pescatore, director at the nonprofit cybersecurity training provider SANS Institute, delved into the legal challenges companies face as they strive to secure ... Continue Reading
Manage Evaluating compliance software and solutions
Learn to apply best practices and optimize your operations.
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading
Data protection rules not only help keep companies regulatory compliant, but can also improve network security -- and maybe even the bottom line. Continue Reading
In this Q&A, Jeffrey Ritter discusses how the quest for big data intelligence is forcing governance professionals to move beyond GRC gatekeeping. Continue Reading
Problem Solve Evaluating compliance software and solutions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data ... Continue Reading
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading
As devices are used for increasingly complex processes, data becomes more vulnerable to loss. To keep pace, IT and security executives are developing comprehensive mobile data security plans and implementing stronger technology solutions. Continue Reading