- February 09, 2012
With the number and severity of breaches increasing, data protection strategies are vital. To help, the Online Trust Alliance has released a guide to online data protection.
- February 06, 2012
After shooting down the Stop Online Piracy Act (SOPA), protesters opposing broad online antipiracy legislation have a new target: the Anti-Counterfeiting Trade Agreement. And this time, the ...
- January 30, 2012
After weeks of nonstop talk (including a lot of criticism) of SOPA and other antipiracy legislation, protecting online privacy is back in the news. The switch in focus came as the European Union ...
- January 27, 2012
Detractors of SOPA and other antipiracy legislation say new regulations are needed -- but they must be better targeted. To do so, they say regulators simply need to follow the money.
- January 20, 2012
It was an eventful week for Internet-related antipiracy legislation, to say the least. After threatening for weeks, Internet giants such as Wikipedia and Google participated in a day-long ...
Sponsored by DellEMC - Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More
Sponsored by DellEMC - Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More
Sponsored by DellEMC - Every organization in every industry is creating massive volumes of data. The goal of many IT modernization efforts is to ensure that the organization can harness the value of that data to understand powerful insights, increase efficiencies and drive innovations. See More
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
- January 16, 2012
The SEC has released new "risk alerts" that outline how financial firms can use social media guidelines to protect their business from fraud and comply with federal regulations.
- January 13, 2012
Just last April, Google Inc. settled Federal Trade Commission (FTC) charges that it used "deceptive tactics and violated its own privacy promises" to consumers when it launched Google Buzz in 2010. ...
- January 06, 2012
Internet giants -- including eBay, Google, Facebook and Twitter -- reportedly are considering a simultaneous "blackout" of their sites in protest of the Stop Online Piracy Act. Now they are ...
- January 03, 2012
After the holidays, many companies are facing an influx of mobile devices that could affect compliance with various regulations. Is your mobile device security strategy ready?
- December 15, 2011
Although many companies see the benefits of a solid cloud computing strategy, our survey found that security and compliance often fall by the wayside when businesses move to the cloud.
- December 14, 2011
As Carrier IQ defends its data collection processes, some experts say the fact that the information being collected exists at all is a potential privacy and compliance violation.
- December 12, 2011
As mandatory eXtensible Business Reporting Language use becomes the norm in business communications, one expert says XBRL tagging can assist risk management and analysis.
- December 08, 2011
With Chris Dodd already in Hollywood, Sen. Barney Frank's retirement announcement last month led some to speculate the push for Dodd-Frank Act regulations would retire with him. The controversial ...
- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- December 01, 2011