Many companies are looking for IT solutions that will help them achieve compliance in the areas of auditing, policies, procedures, authentication and authorization.

AdviceHere are five land mines of information management, and how to avoid each one of them.
AnalysisCollaborative governance makes business and IT team members partners in data discovery.
BlogsYour customers -- users themselves -- must remain the ultimate owner of their own data.
Comments (3)
NewsFully 92 percent of CIOs believe Chief Data Officers (CDOs) will be the new keepers of data strategy and data quality within large enterprises -- with CDOs grabbing corporate boardroom seats by 2020.
Comments (1)
NewsChina, which aims to curb dependence on foreign technology, plans to require the registration of source code for information-technology products used by banks.
NewsDeloitte LLP named Cathy Engelbert to be the first woman leading a Big Four consulting-and-accounting firm in the U.S. as clients confront tighter financial regulations and cyber risks.
NewsTwitter Inc. said government requests for user data and content removal jumped in the second half of 2014, especially in Russia, Turkey and the U.S.
Information Management's DM RadioIs privacy really dead? Online, such would seem to be the case. Cookie trails lurking wherever you go, tracking every click and even every movement of the mouse. Google, Facebook and countless other sites make money by analyzing your behavior. But where is the line drawn? Anonymized aggregates? Granular, personal detail? Register for this episode of DM Radio to find out! Host Eric Kavanagh will interview Steven Pratt of Deloitte and Roger Strukhoff of the Tau Institute.
BlogA look at how the bipartisan legislation has impacted government agencies so far.
NewsGoogle is now a member of the PricewaterhouseCoopers vendor team competing for the Department of Defense electronic health records contact valued at up to $11 billion.
NewsProposed cybersecurity legislation from the White House may compel a major change in the HIPAA breach notification rule.
NewsThe vast majority of IT and security managers concede they don't know the number of shadow IT cloud apps within their organization -- which employees use without corporate IT's approval.
Please note you must now log in with your email address and password.