Many companies are looking for IT solutions that will help them achieve compliance in the areas of auditing, policies, procedures, authentication and authorization.


NewsDeloitte LLP named Cathy Engelbert to be the first woman leading a Big Four consulting-and-accounting firm in the U.S. as clients confront tighter financial regulations and cyber risks.
NewsTwitter Inc. said government requests for user data and content removal jumped in the second half of 2014, especially in Russia, Turkey and the U.S.
Information Management's DM RadioIs privacy really dead? Online, such would seem to be the case. Cookie trails lurking wherever you go, tracking every click and even every movement of the mouse. Google, Facebook and countless other sites make money by analyzing your behavior. But where is the line drawn? Anonymized aggregates? Granular, personal detail? Register for this episode of DM Radio to find out! Host Eric Kavanagh will interview Steven Pratt of Deloitte and Roger Strukhoff of the Tau Institute.
BlogA look at how the bipartisan legislation has impacted government agencies so far.
NewsGoogle is now a member of the PricewaterhouseCoopers vendor team competing for the Department of Defense electronic health records contact valued at up to $11 billion.
NewsProposed cybersecurity legislation from the White House may compel a major change in the HIPAA breach notification rule.
NewsThe vast majority of IT and security managers concede they don't know the number of shadow IT cloud apps within their organization -- which employees use without corporate IT's approval.
NewsLarge and midsize companies are embracing Disaster Recovery as a Service (DRaaS) offerings that feature hybrid cloud capabilities, according to new research from TechNavio.
NewsChina is aiming to purge most foreign technology from banks, the military, state-owned enterprises and key government agencies by 2020, stepping up efforts to shift to Chinese suppliers, according to people familiar with the effort.
NewsInformation security professionals in general want a single, comprehensive endpoint security system, but endpoint security deployment typically is tactical and driven more by firefighting than strategy, according to a new report from research firm Enterprise Strategy Group (ESG).
NewsTarget Corp. is asking a federal judge to throw out claims by banks that had to deal with the consequences of a data breach that compromised at least 40 million credit-card accounts.
NewsA new report from the Institute of Medicine advocates incorporating standardized social and behavioral data into electronic health records.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.