- November 10, 2011
Our roundup of IT compliance tools highlights new security features from both GFI Software and Guidance Software, and a risk management dashboard from Dow Jones Risk & Compliance.
- November 07, 2011
Early in my career I was influenced by the work of Christopher Alexander, an architecture professor at the University of California, Berkeley. Alexander and his team researched and cataloged ...
- October 31, 2011
National Cybersecurity Awareness Month has drawn to a close, but it's clear that much still needs to be done to protect information online. One recent survey has found that small businesses - which ...
- October 24, 2011
- October 18, 2011
After hackers gained access to the personal information of more than 100 million user accounts last spring, Sony overhauled online security and created a chief information security officer (CISO) ...
Sponsored by IBM - There’s a new mantra in endpoint management: A device is a device is a device. If you’re in IT or security, you have to treat every device the same way, no matter the format or operating system version. The answer? A UEM with cognitive capabilities. See More
Sponsored by IBM - UEM provides the appropriate levels of productivity and security functionality to support your entire environment of smartphones, tablets, laptops, desktops, wearables and IoT. Here are the top 10 things to look for in a solution. See More
Sponsored by IBM - When used in combination, UEM and AI/cognitive technologies deliver an intelligent advantage that results in cost savings, reduced complexity and productivity gains. It’s time to stop using yesterday’s technologies to address tomorrow’s challenges. See More
Sponsored by IBM - Enterprises need a tool that provides centralized visibility, control, and security for all endpoints, users, applications, content, and data. With unified endpoint management, IT can finally modernize endpoint management and security. Here’s how. See More
- October 17, 2011
Compliance means different things to different people. Indeed, regulatory compliance requirements are -- and should be -- handled differently based on the unique needs of the business. The ugly ...
- October 10, 2011
October is National Cybersecurity Awareness Month, and the overarching theme this year is to spread awareness of every Internet user's role in securing their information. In other words, YOU are ...
- October 03, 2011
October is National Cyber Security Awareness Month, and this year's theme is meant to remind individuals of their role in securing information, as well as the devices and the networks they use. ...
- September 26, 2011
The regulatory landscape's evolution requires close attention to risk management and compliance processes. But GRC also makes good business sense, and can improve your bottom line.
- September 26, 2011
Recognizing the "significant opportunities" surrounding cloud computing, the Subcommittee on Technology and Innovation held a hearing last week to examine the benefits -- and obstacles -- of ...
- September 19, 2011
A few weeks ago in this space, I wondered if increased scrutiny of Google's business practices was just the beginning of the federal government's efforts to regulate the Internet. Judging by a ...
- September 12, 2011
The rollout of regulations under the Dodd-Frank Wall Street Reform and Protection Act has been pushed back until at least early 2012, according to the Commodity Futures Trading Commission (CFTC). ...
- September 07, 2011
In a recent settlement with the Department of Justice (DOJ), Google gave up $500 million due to questions surrounding its advertising practices. This is one of the largest settlements ever in the ...
- August 31, 2011
Our latest Product Spotlight roundup of IT compliance tools features NetWrix's Change Reporter Suite, a change auditing solution; and SPDX 1.0, an open source software tool.
- August 29, 2011
The Cloud Security Alliance is launching a new program for gathering information on how cloud service providers are securing their services and meeting compliance initiatives. The CSA Security, ...