- January 30, 2012
After weeks of nonstop talk (including a lot of criticism) of SOPA and other antipiracy legislation, protecting online privacy is back in the news. The switch in focus came as the European Union ...
- January 27, 2012
Detractors of SOPA and other antipiracy legislation say new regulations are needed -- but they must be better targeted. To do so, they say regulators simply need to follow the money.
- January 20, 2012
It was an eventful week for Internet-related antipiracy legislation, to say the least. After threatening for weeks, Internet giants such as Wikipedia and Google participated in a day-long ...
- January 16, 2012
The SEC has released new "risk alerts" that outline how financial firms can use social media guidelines to protect their business from fraud and comply with federal regulations.
- January 13, 2012
Just last April, Google Inc. settled Federal Trade Commission (FTC) charges that it used "deceptive tactics and violated its own privacy promises" to consumers when it launched Google Buzz in 2010. ...
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
Sponsored by DellEMC - Organizations that embrace IT Transformation are 18x more likely to make faster, data-driven decisions—while also being more innovative, competitive and cost-efficient. With fast, automated access to real-world data from current workloads, you can expedite development cycles, eliminate silos and accelerate access to innovation. Here’s how. See More
Sponsored by DellEMC - IT teams are under the gun to make data-based, future-oriented infrastructure investments to support IT transformation and cloud computing. Here’s how your organization can easily and efficiently collect, visualize, model and share real-world data from existing workloads to make faster and smarter decisions. See More
Sponsored by DellEMC - Modernizing your application portfolio demands that you analyze each app to identify cost savings and gaps in features and functions that could have a negative impact on your competitive posture or operational efficiencies. To do this most efficiently, you need actionable data about how applications and workloads are performing in your environment. See More
- January 06, 2012
Internet giants -- including eBay, Google, Facebook and Twitter -- reportedly are considering a simultaneous "blackout" of their sites in protest of the Stop Online Piracy Act. Now they are ...
- January 03, 2012
After the holidays, many companies are facing an influx of mobile devices that could affect compliance with various regulations. Is your mobile device security strategy ready?
- December 15, 2011
Although many companies see the benefits of a solid cloud computing strategy, our survey found that security and compliance often fall by the wayside when businesses move to the cloud.
- December 14, 2011
As Carrier IQ defends its data collection processes, some experts say the fact that the information being collected exists at all is a potential privacy and compliance violation.
- December 12, 2011
As mandatory eXtensible Business Reporting Language use becomes the norm in business communications, one expert says XBRL tagging can assist risk management and analysis.
- December 08, 2011
With Chris Dodd already in Hollywood, Sen. Barney Frank's retirement announcement last month led some to speculate the push for Dodd-Frank Act regulations would retire with him. The controversial ...
- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- December 01, 2011
- November 29, 2011
Federal governments all over the world have become increasingly hands-on with cybersecurity strategy and online privacy, but businesses have sometimes been critical of new rules that they say will ...
- November 23, 2011
In 2011, mobile malware and targeted attacks against big-name companies were among the top online security threats. Here’s why you need to prepare for more of the same in 2012.