compliance - News, Features, and Slideshows
compliance in pictures
Dennis Technology Labs, the London-based organisation which runs tests to evaluate anti-virus software, yesterday released its latest test results on products for three distinct product segments--enterprise, home and small-to-mid-sized business (SMB). Its tests are not sponsored by vendors, the lab says.
By Ellen Mesmmer | 12 July, 2013 21:22
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.
By Christian Anschuetz and Dan Abdul | 22 April, 2013 10:56
In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data.
By Tatu Ylönen, CEO and founder of SSH Communications Security | 01 March, 2013 22:12
Startup Convercent officially debuted today with a software-as-a-service (SaaS) offering that lets employers make available to employees in electronic form, via computer or mobile device, the workplace ethics and compliance terms the business supports.
By Ellen Messmer | 29 January, 2013 17:02
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
By Ellen Messmer | 10 January, 2013 13:58
Whitepapers about compliance
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
If your business has plans that include aggressive growth and aspires to be a best-in-class organization, your IT systems and applications need to be up to the task. Homegrown solutions or outdated software can hamper the execution of your strategic vision. If your IT infrastructure and maintenance costs are affecting your ability to stay competitive, then a cloud-based enterprise resource planning (ERP) suite is well worth exploring. This eBook explores the core components of a cloud-based ERP solution that delivers enterprise-class software without sacrificing functionality or changes to business processes and with no additional cost for infrastructure and complicated integrations.
- Barbarians are at the gates of Information Age: Juniper
- UPDATED: Vodafone upbeat on turnaround despite more customer losses
- Apple hit with class action lawsuit for alleged labor rule violations
- Telstra to kill 2G services
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
- Apple grows Mac sales by 18 per cent on the back of the MacBook Air
- Rules of engagement needed for the Internet: RSA
- How Nokia both helped and hindered Microsoft's earnings
- Five takeaways from the Apple earnings call
- More mobile gadgets than people? Seven countries - including Australia - now qualify
- Apple "inadvertently admitted" to iOS backdoor: forensics expert
- Juniper jettisons mobile security business
- TOR patch coming
- Microsoft revenue lifted by Cloud sales to businesses