- June 25, 2014
#GRCchat participants discussed the FCC net neutrality proposal and what it might mean for companies, ISPs and consumers in this recap of SearchCompliance's monthly Twitter chat.
- June 06, 2014
May #GRCchat participants share top information security threats and how to prevent data breaches caused by the biggest culprits: employees.
- May 30, 2014
Tenable Network Security CSO Marcus Ranum reveals that data-driven intelligence is not as critical as system logging to security strategy.
- May 20, 2014
In this #GRCchat recap, a former Federal Communications Commission CIO discusses how a quantitative risk profile can mitigate financial risk.
- December 20, 2013
As businesses expand their IT security and compliance focus, GRC professionals are seeing salary increases with their broadened responsibilities.
Sponsored by HPE - Organizations are increasingly turning to hybrid cloud as the platform of choice as they continue to respond to changing business conditions caused by the global COVID-19 pandemic. In addition to research by Hewlett Packard Enterprise (HPE) on cloud acceleration and remote work, a recent survey by KPMG sheds light specifically on the value of hybrid cloud. See More
Sponsored by Dell Technologies - Increased complexity is one of the biggest challenges facing IT teams in building and managing multicloud environments. Using different management tools for different platforms, whether private or public clouds, makes it harder—if not impossible—to effectively manage costs, security, governance, performance, compliance and availability. See More
Sponsored by HPE - COVID-19 has forced many organizations to embrace digital transformation to accommodate dramatic and sudden changes in their business models. Almost every industry has been affected: Healthcare had to expand telehealth services, retail had to move to online, and education had to shift to remote teaching and learning—all at a rapidly accelerated pace. See More
Sponsored by Dell Technologies - IT teams can significantly mitigate risk in moving workloads to the cloud by using familiar technologies, processes and skill sets across all environments, from the data center to the edge to multicloud environments. See More
- November 18, 2013
Dodd-Frank conflict mineral provisions create new disclosure rules for public companies. In this tip, learn how to prepare for the regulations.
- April 15, 2013
(This blog post was written by Marilyn Bier, chief executive officer of ARMA International.) Organizations depend on information to manage day-to-day operations, comply with regulations, gauge ...
- March 08, 2013
In this Product Spotlight, learn about new compliance monitoring tools to help financial institutions meet regulatory and data reporting requirements.
- January 18, 2013
So you want to pursue a career in compliance? I can't really blame you. With a median salary of more than $60,000, it can certainly pay off -- and the sky's the limit moving forward. Of course, ...
- July 13, 2012
Our latest product spotlight examines the Unified Compliance Framework, an online tool designed to identify and reduce redundant GRC processes.
- May 14, 2012
The GRC technology market has become increasingly targeted but companies' buying decisions have not followed suit. How can you make sure you're getting the most bang for your buck?
- May 08, 2012
If you look at news headlines, you’d think the sky were falling with all of the hack attacks and subsequent data breaches taking place. Just glancing at the Chronology of Data Breaches says it all. ...
- April 23, 2012
ISACA’s update to its popular COBIT 5 framework incorporates a business-wide approach the organization says helps enterprises maximize their information and technology assets.
- February 09, 2012
With the number and severity of breaches increasing, data protection strategies are vital. To help, the Online Trust Alliance has released a guide to online data protection.
- December 15, 2011
Although many companies see the benefits of a solid cloud computing strategy, our survey found that security and compliance often fall by the wayside when businesses move to the cloud.
- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- October 17, 2011
Compliance means different things to different people. Indeed, regulatory compliance requirements are -- and should be -- handled differently based on the unique needs of the business. The ugly ...
- September 26, 2011
The regulatory landscape's evolution requires close attention to risk management and compliance processes. But GRC also makes good business sense, and can improve your bottom line.
- July 05, 2011
Companies need an effective way to mitigate the risks of increasingly ubiquitous social media. But establishing a solid corporate social media policy is no easy task.
- May 19, 2011
In the need for some IT training? Check out our list of GRC conferences designed to help your enterprise stay current with the latest compliance regulations and GRC strategy trends.
- March 17, 2011
The e-discovery software market is growing due to more stringent governance, risk management and compliance regulations -- a trend that’s driving the creation of smarter solutions.
- February 17, 2011
Constant updates to compliance regulations can cause headaches for IT departments. Learn more about the latest compliance products to help you with compliance and GRC management.
- October 11, 2010
The financial crisis is an example of what can happen when those responsible for establishing and maintaining risk management practices are asleep at the switch, an expert says.
- September 17, 2010
The CISO of financial giant Credit Suisse says the key to successful global security and risk management is a uniform governance system supported by a common policy framework.
- July 23, 2010
IT Compliance Advisor welcomes our new blogger, Frank Ohlhorst: Meeting the needs of compliance regulations effectively means that IT staffers must be able to monitor and report on any activity ...
- May 18, 2010
Gartner analyst wonders why no PCI-like standard exists for bank account information, which online criminals are targeting.
- January 26, 2010
Experts share lessons learned by midmarket companies trying to comply with PCI DSS in areas such as self assessment questionnaires, encryption, policy creation and application security
- December 18, 2009
FISMA compliance is on the horizon for cloud computing vendors catering to the federal government. New security metrics from OMB aren't hazy on potential requirements, either.
- December 16, 2009
ISACA has released a risk management framework to help enterprise compliance officers identify, govern and manage IT risk. The Risk IT framework is aligned with COBIT.
- October 21, 2009
As SaaS and cloud vendors promote security standards like ISO 27001 or SAS 70, experts urge users to delve deeper. What matters is that vendors meet your security needs.
- October 06, 2009
Emerging technologies that allow users to broadcast geographic locations raise many issues for companies, CIOs, while legislatures and the FTC consider legal aspects.
- July 28, 2009
Traditionally adversaries, CISOs and auditors can leverage each other's skills to move toward a risk-based approach to compliance.
- June 30, 2009
Using a risk-based approach to address regulatory mandates is all the rage in compliance circles, but it's not for beginners. Here's how it works.
- June 19, 2009
Twitter can be used for social good, business and journalism, but the potential for exploitation by cybercriminals and noncompliance with regulatory requirements is real and growing.
- March 19, 2009
[One of our readers, compliance officer Ramon de Bruijn, wrote to the editors of SearchCompliance.com at [email protected] last month looking for some advice. Specifically, he asked "What ...
- October 09, 2008
As the SEC looks to replace Generally Accepted Accounting Principles with the International Financial Reporting Standards, CIOs should evaluate the effects on financial data and application architecture now.
- January 09, 2008
Shon Harris suggests ways to draft an internal procedure on how to handle confidential data. She discusses data classification polices, steps to develop and roll out a data classification program, and what your guidelines should cover.