July 2012
-
July 31, 2012
31
Jul'12
Video: Cybersecurity strategy onus on users in dangerous online world
In this video, IT security expert Hord Tipton discusses how cybercriminals' new, sophisticated tactics should influence your cybersecurity strategy. Continue Reading
-
July 26, 2012
26
Jul'12
Survey: IT consumerization alive and well, but security lacking
Despite an IT consumerization influx, some organizations leave something to be desired when it comes to mobile device security, our survey found. Continue Reading
-
July 25, 2012
25
Jul'12
Audit management: Five strategies to streamline the PCI audit process
Tired of the same Payment Card Industry (PCI) assessment headaches every year? Here are five process strategies to streamline the PCI audit process. Continue Reading
-
July 23, 2012
23
Jul'12
Unlike other compliance areas, e-discovery strategy lacks direction
In this Q&A, technology law expert Jeffrey Ritter discusses how companies can overcome e-discovery strategy's lack of clear regulation and direction. Continue Reading
-
July 20, 2012
20
Jul'12
Book excerpt: 'Network Forensics: Tracking Hackers through Cyberspace'
Sherri Davidoff, co-author of 'Network Forensics: Tracking Hackers through Cyberspace,' discusses how network forensics can assist IT security. Continue Reading
-
July 19, 2012
19
Jul'12
Business records management
-
July 18, 2012
18
Jul'12
Organizational development's influence on the e-discovery process
Contributor John Weathington explains the importance of organizational culture and structure when developing an e-discovery process. Continue Reading
-
July 18, 2012
18
Jul'12
Enterprise cloud compliance
-
July 18, 2012
18
Jul'12
Information technology governance
-
July 16, 2012
16
Jul'12
The sometimes-harsh realities of information security and compliance
Following information security and compliance regulations can hinder your everyday business processes. Here's why you need to strike a proper balance. Continue Reading
-
July 16, 2012
16
Jul'12
NERC CIP (critical infrastructure protection)
The NERC CIP (critical infrastructure protection) plan is a set of requirements designed to secure assets vital to reliably operating North America's bulk electric system. Continue Reading
-
July 13, 2012
13
Jul'12
Developers: Unified Compliance Framework helps organize GRC processes
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes. Continue Reading
-
July 11, 2012
11
Jul'12
The role of metadata management in information governance strategy
In this video, learn the importance of metadata to your organization's records management plan and how it influences information governance strategy. Continue Reading
-
July 03, 2012
03
Jul'12
The information management and governance challenge in modern business
In this video, learn about information management and governance trends, including how regulatory and privacy initiatives are influencing processes. Continue Reading