- September 13, 2012
Directives under a new federal records management initiative have the potential to vastly improve information governance in the public sector.
- September 07, 2012
In this Q&A, find out what attendees can expect from the upcoming ARMA conference, and learn about new trends in information governance strategy.
- August 30, 2012
We've been talking a lot about records management here at SearchCompliance.com this summer … perhaps President Barack Obama is a fan? Probably not, but last week the White House announced key dates ...
- August 24, 2012
In this product spotlight, learn about LockPath Inc.'s Keylight platform designed to help meet organizations' regulatory compliance management needs.
- August 10, 2012
Data management and security could create huge problems in our increasingly-connected world, as two recent events have made evident: Earlier this month, a Knight Capital computer program unleashed ...
Sponsored by IBM - There’s a new mantra in endpoint management: A device is a device is a device. If you’re in IT or security, you have to treat every device the same way, no matter the format or operating system version. The answer? A UEM with cognitive capabilities. See More
Sponsored by IBM - UEM provides the appropriate levels of productivity and security functionality to support your entire environment of smartphones, tablets, laptops, desktops, wearables and IoT. Here are the top 10 things to look for in a solution. See More
Sponsored by IBM - When used in combination, UEM and AI/cognitive technologies deliver an intelligent advantage that results in cost savings, reduced complexity and productivity gains. It’s time to stop using yesterday’s technologies to address tomorrow’s challenges. See More
Sponsored by IBM - Enterprises need a tool that provides centralized visibility, control, and security for all endpoints, users, applications, content, and data. With unified endpoint management, IT can finally modernize endpoint management and security. Here’s how. See More
- August 01, 2012
In this Q&A, consultant and auditor Paul Kirvan discusses what you need to consider when developing a business continuity and disaster recovery plan.
- July 26, 2012
Despite an IT consumerization influx, some organizations leave something to be desired when it comes to mobile device security, our survey found.
- July 23, 2012
In this Q&A, technology law expert Jeffrey Ritter discusses how companies can overcome e-discovery strategy's lack of clear regulation and direction.
- July 13, 2012
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.
- June 29, 2012
In this Q&A, law and technology expert Jeffrey Ritter discusses the heightened importance of corporate information governance and how companies should adapt to the trend.
- June 25, 2012
Analyst Chris McClean discusses the chief compliance officer's role as risk management and compliance are increasingly tied to business success.
- June 22, 2012
Are you prepared for the inevitable? Odds are it's merely a matter of time before your business experiences a computer security-related breach and you need a solid data breach response plan. How ...
- June 18, 2012
As organizational data proves invaluable, protecting it becomes more vital, so compliance departments can expect a bigger voice in business strategy.
- June 12, 2012
In the corporate world, keeping track of compliance mandates can be a challenge. Here's how technology can help with regulatory compliance management.
- June 08, 2012
Our latest compliance product roundup spotlights regulatory compliance management solutions recently released by MetricStream and RSA Security Management.