By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluating compliance software and solutions News
December 19, 2016
After the U.S. was allegedly plagued by Russian cyberattacks during the election, members of both the Democratic and Republican parties are now calling for investigations. Also in recent GRC news: ...
November 17, 2016
Will President-elect Trump's transition team follow through on promises to get rid of Dodd-Frank compliance regulations? Also in recent GRC news, tech companies urge Trump to back encryption; and ...
September 08, 2016
The E.U. has ordered Ireland to collect more than $14B in taxes from Apple that, according to the E.U., have gone unpaid for years. Also in recent GRC news, state voter registration system breaches ...
June 01, 2016
Office 365 compliance problems vary, according to the nature of the Microsoft services that companies use. Shawn Shell explains.
Evaluating compliance software and solutions Get Started
Bring yourself up to speed with our introductory content
As ransomware attacks continue to escalate, should organizations make employees an integral part of their ransomware detection and prevention strategy? Continue Reading
RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance. Continue Reading
There are paths you can take if your organization does not allow for DR plan spending. Check out templates, websites and a concise demonstration of how to do it. Continue Reading
Evaluate Evaluating compliance software and solutions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft's Office 365 plans make a host of apps -- and data -- easily available to users. Expert Reda Chouffani shares seven security and compliance features you should be using. Continue Reading
Microsoft's newest version of SharePoint includes new and improved security features focused on encryption and information rights management. Continue Reading
It is important for companies to invest in a GRC process to help boost strategies devised to combat technology-related risks. Continue Reading
Manage Evaluating compliance software and solutions
Learn to apply best practices and optimize your operations.
Risk analytics tools are more and more critical for CFOs seeking to improve operational efficiency. Just one problem: It can be hard to figure out just what those tools are. Continue Reading
Etay Maor, executive security advisor at IBM, discusses the growing ransomware threat and why IoT could be the next ransomware target. Continue Reading
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading
Problem Solve Evaluating compliance software and solutions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data ... Continue Reading
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading