Get started
Bring yourself up to speed with our introductory content.
Vulnerability assessment for compliance
risk intelligence (RQ)
Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities. Continue Reading
U.S. Department of Homeland Security (DHS)
The U.S. Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats. Continue Reading
Test your social media risk management IQ: A SearchCompliance.com quiz
Proliferating social networks have cast a spotlight on social media risk management. Take our quiz to find out if you are up to speed on social media. Continue Reading
-
Compliance Briefing: A guide to social media risk management strategy
Social media is valuable, but it’s also risky. Here are strategies for corporate social media policy, social network monitoring and risk management to protect sensitive information. Continue Reading
FAQ: How will the Epsilon security breach influence email regulations?
The Epsilon security breach put a spotlight on email regulations, or the lack thereof. In this FAQ, learn what caused the breach, its cost to customers and the potential impact. Continue Reading
GRC management strategies: Test your IQ
Are you up to speed on the latest governance, risk and compliance management strategies? Take our GRC quiz and find out.Continue Reading
internal control
An internal control is a business practice, policy or procedure that is established within an organization to create value or minimize risk.Continue Reading
FAQ: What is the Federal Information Security Management Act?
The Federal Information Security Management Act aims to improve information security by requiring federal agencies to comply with standards. Learn more with this FISMA FAQ.Continue Reading
FAQ: What impact do mobile computing devices have on IT compliance?
More mobile devices means more security threats. Here are things to consider in adjusting your IT compliance strategy to meet challenges brought by iPhones and the like.Continue Reading
What is NERC CIP, and IT's role in critical infrastructure protection?
Under the NERC CIP, power generators and suppliers must prove NERC compliance on critical infrastructure protection provisions by the end of the second quarter. Will you be ready?Continue Reading