Evaluating compliance software and solutions News
November 19, 2015
TechTarget 2015 Annual Salary and Careers Survey: Out of the myriad of security responsibilities for an enterprise, IT risk management and regulatory compliance occupy the most time.
July 06, 2015
Honda has revamped its regulatory compliance reporting processes after information technology failures led to record fines for TREAD Act violations.
April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
September 26, 2014
Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.
Evaluating compliance software and solutions Get Started
Bring yourself up to speed with our introductory content
Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel. Continue Reading
Predictive coding software can be used to automate portions of an e-discovery document review. The goal of predictive coding is to reduce the number of irrelevant and non-responsive documents that need to be reviewed manually. Continue Reading
Computers are increasingly called as witnesses in court cases, forcing companies to ensure information governance processes are able to produce reliable digital evidence. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Evaluating compliance software and solutions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Drawing the line between protecting consumers' right to data privacy and giving the government access to that data to keep the public safe isn't as simple as looking at legal cases that have dealt ... Continue Reading
In this webcast, learn automated information security monitoring and analytic techniques to protect data in the face of rapidly evolving cyberthreats. Continue Reading
Three years in the making, European Union officials finally agreed on a draft of the General Data Protection Regulation. The EU-wide legal framework sets standards for data collection, sharing and ... Continue Reading
Manage Evaluating compliance software and solutions
Learn to apply best practices and optimize your operations.
Cloud computing and mobile devices have undoubtedly changed the nature of content-based security. But have enterprise methods caught up? Continue Reading
If private companies aren't adequately protecting consumer data against breaches, should governmental agencies step in and develop guidelines? Continue Reading
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data ... Continue Reading
Problem Solve Evaluating compliance software and solutions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading
As devices are used for increasingly complex processes, data becomes more vulnerable to loss. To keep pace, IT and security executives are developing comprehensive mobile data security plans and implementing stronger technology solutions. Continue Reading
In this tip, learn how to prepare and implement a mobile data management policy that protects your organization against compliance violations. Continue Reading