regulatory compliance - News, Features, and Slideshows
Microsoft has extended the data loss prevention features in Office 365 so that they are available not only for its email tools but also for data in SharePoint Online and OneDrive for Business.
By Juan Carlos Perez | 28 August, 2014 05:57
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
By Juan Carlos Perez | 05 December, 2013 19:28
Microsoft today launched a searchable list of its complete patent portfolio as part of its defense of the patent system, particularly software patents.
By Gregg Keizer | 28 March, 2013 20:43
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
By Ellen Messmer | 10 January, 2013 13:58
Companies have a lot to gain by maintaining control of IT assets. They can avoid massive unplanned expenses, increase productivity and provide easy access to information for decision making. When designing an IT asset management (ITAM) program, keep these tips in mind.
By Brian Hollandsworth, product manager, ServiceNow | 12 December, 2012 19:23
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2014 20:04
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
By Chris Kanaracus | 17 June, 2013 15:56
Whitepapers about regulatory compliance
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
With some of the highest levels of social media penetration, mobile device ownership, and Internet connectivity in the world, Asian markets are ripe for more innovative and adept interactive engagement. In this study, we look at how marketers in the region express high hopes for digital, but hare held back with limited budgets and a region-wide lack of talent and training. Click for more
- Dell's PC, tablet innovations draw attention
- Smaller Windows PC makers nip at Apple's heels in customer satisfaction
- We just might put a dent in data breaches
- EU tells Google to make more concessions or face charges in antitrust dispute
- Apple outsmarts the thieves
- j2 Global acquires Web24 Group for undisclosed sum
- Lyft acquires ride-sharing startup Hitch
- TasWater archives to deal with data deluge
- Telstra plans hook up to Equinix Australian data centres
- In Pictures: The wild world of workplace wearables
- In Pictures: Inside a thriving Shenzhen market for used iPhones
- In Pictures: NASA’s human space flight return
- VDSL2 standards for NBN to clean up interference
- TPG revenue soars, ISP releases FTTB plan details
- Crashing Apple's iOS 8 party