Many companies are looking for IT solutions that will help them achieve compliance in the areas of auditing, policies, procedures, authentication and authorization.

NewsMerrill Lynch will pay a settlement of nearly $11 million after the Wall Street firm used inaccurate data to execute some short sale orders, the SEC announced.
As organizations gather and manage more and more big data, here are 10 best practices to protect all of that information from hackers and cyber breaches.
NewsThe hospital system is notifying about 220,000 patients following discovery of a phishing attack that accessed some employee email boxes as far back as November 2013.
NewsAllstate Corp. said improved technology will eventually give the auto insurer a chance to boost revenue by selling customer driving data, much as Google Inc. profits by collecting information on those who use its search engine.
NewsThe Cedars-Sinai Health System in Los Angeles has integrated its Epic electronic health records system with Apple’s HealthKit to leverage data from more than 80,000 patients.
NewsA closer look at the CareFirst BlueCross BlueShield hack, and the state of health insurer cyber security amid the evolving threat landscape.
NewsThe copier company is getting deeper into data and predictive analytics. Here's what Xerox's buyout of Health Communities Institute means to the healthcare market.
ComplianceHow can organizations protect data against a wave of smarter, better organized, highly funded cyber criminals? The answer involves three data governance realities.
NewsAmid HIPAA privacy regulations and growing cybersecurity concerns, the IEEE has issued guidance to help software developers write secure applications for medical devices.
NewsA mobile smartphone tracking app vs. user privacy. Why a former employee sued her former employer over alleged wrongful termination.
NewsGoogle Inc. expanded the information it discloses in its report on government requests for data, as the Internet-search company seeks to balance the demands of law-enforcement agencies with its need to protect user privacy.
BlogFinance and accounting organizations may need to double-check their software and processes amid shifting regulations.
Please note you must now log in with your email address and password.