Manage
Learn to apply best practices and optimize your operations.
Automating compliance processes
SEC's iXBRL requirements met with optimism -- and trepidation
Compliance with the SEC's new Inline XBRL requirements will change financial reporting processes. The benefits are there, but not everyone is optimistic about the change. Continue Reading
AI security tech is making waves in incident response
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense. Continue Reading
Data governance for legal and regulatory compliance
Digitization is forcing companies to make big changes to information governance processes to ensure data maintains legal and regulatory compliance. Continue Reading
-
Information governance 2015: The year of digital evidence as truth
Businesses saw major shifts to their information governance 2015 processes as legal and compliance rules more heavily relied on digital evidence as truth. Continue Reading
Mobility gets boost from automated compliance management systems
In this tip, learn how automated compliance management can overcome enterprise mobility complications and save valuable company resources. Continue Reading
Big changes to Adobe licensing may increase audits in short term
Adobe's transition to a subscription-based cloud system creates many new user agreement options. But will the change also increase users' audits?Continue Reading
Predictive coding assists in e-discovery, doesn't replace human review
Predictive coding has become a valuable legal tool, but experts caution its benefits are only as good as the human programmers running the system.Continue Reading
Looking to better manage insider security risks? Try compliance
Compliance officers have tried a variety of approaches to minimize insider security risks. Our expert suggests that maybe it's time for a compliance-driven solution.Continue Reading
How good is your mainframe at data security? Not as good as you think.
Despite mainframes' reputation for data security, their increasing interaction with Web-based environments makes them vulnerable. Take these steps to seal the cracks.Continue Reading
An ERM strategy that leverages compliance for IT/business alignment
Compliance can be achieved through enterprise risk management, but your ERM strategy may not mean compliance. Here's how to leverage ERM for compliance.Continue Reading
-
Business Model for Information Security: Security right the first time
The Business Model for Information Security, a new framework introduced by ISACA, employs 'systems thinking' models that promise to get security right the first time.Continue Reading
FAQs about compliance audits in IT
New and more complicated regulations have made compliance audits a fact of life for modern organizations. Learn about IT's role in the audit process in this FAQ.Continue Reading
Be ready for electronic discovery with a records retention policy
Email does not drive records retention policy -- it's about what's in the email. With a few simple steps you can help prevent electronic discovery surprises and costly fines.Continue Reading
Social media platforms demand a clear employee Internet use policy
Social media platforms make it easier than ever for employees to post information that could be harmful to your business. Here are some steps to take.Continue Reading
Pietrylo case a cautionary Web 2.0 communications compliance failure
Enterprises must balance mitigation and respect for employee creativity and expression in Web 2.0 communications, while allowing for marketing and public relations.Continue Reading