- June 08, 2012
When moving data to the cloud, you're still responsible for adhering to regulations. Proper planning can ensure cloud computing data security is not an oxymoron at your company.
- May 31, 2012
Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.
- May 29, 2012
Remember the law of inertia from physics class? It says that a body at rest tends to remain at rest unless acted upon by an outside force. Well, compliance is the law of inertia-type catalyst when ...
- May 21, 2012
Technology law expert Jeffrey Ritter discusses how bring-your-own-device programs, cloud use and vendor relationships should influence your data protection strategy.
- May 14, 2012
Advanced technologies create more data than ever for companies to protect, but it's not all bad news. Here's why using the latest cutting-edge tools can help your GRC strategy.
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- May 14, 2012
The GRC technology market has become increasingly targeted but companies' buying decisions have not followed suit. How can you make sure you're getting the most bang for your buck?
- May 08, 2012
If you look at news headlines, you’d think the sky were falling with all of the hack attacks and subsequent data breaches taking place. Just glancing at the Chronology of Data Breaches says it all. ...
- May 07, 2012
Technology law expert Jeffrey Ritter discusses the obstacles to governing social media security in 21st century business and what companies can do to protect their information.
- May 04, 2012
GRC platform vendor Aruvio has rolled out AruvioGRC, describing the cloud-based tool as faster, cheaper and easier to use than conventional GRC software.
- April 27, 2012
Presenters at the upcoming GRC Summit Boston preview what attendees can expect to learn about optimizing their GRC strategy in today's regulatory landscape.
- April 24, 2012
Wal-Mart's new GCO will begin their tenure trying to explain to federal investigators how it is that Wal-Mart’s Mexican subsidiary managed to cover up a reported $24 million in bribes since 2004.
- April 23, 2012
ISACA’s update to its popular COBIT 5 framework incorporates a business-wide approach the organization says helps enterprises maximize their information and technology assets.
- April 19, 2012
President Barack Obama recently signed the JOBS Act into law, cutting back Sarbanes-Oxley requirements for emerging companies. Next up? Dodd-Frank compliance regulations. The House Financial ...
- April 16, 2012
The JOBS Act alters compliance requirements for emerging companies, but experts say it should have little influence on GRC tools and strategy for those already on the right track.
- April 11, 2012
So now that President Obama has signed the JOBS Act into law, will deregulating the emerging businesses increase jobs and jumpstart the economy as intended? Or will the financial deregulation ...