New & Notable
Compliance strategies and best practices News
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
May 29, 2014
CFOs peppered a panel of security experts on how to establish security in a software as a service (SaaS) world.
January 22, 2013
The U. of Michigan CIO talks about embracing cloud solutions as part of a school-wide strategy of adopting cutting-edge tech to drive innovation.
September 18, 2012
Cloud service providers can serve their customers better by coaching them through gray areas of security and compliance.
Compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
Field-level encryption is the ability to encrypt data based on entire fields. Continue Reading
A shadow app is a software program that is not supported by an employee's information technology (IT) department. Continue Reading
Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading
Evaluate Compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Faster and safer than a car, easier to operate than a plane, more convenient than commercial flying, here comes the flying car -- again. Continue Reading
Health care CIOs give vendors a laundry list of what they'll buy now, including HIPAA compliance and security help, iPad EHR interfaces and tools to improve interoperability. Continue Reading
E-discovery and litigation concerns are serious responsibilities for IT staffs. Learn how to tackle them with this CIO Briefing. Continue Reading
Product ReviewsPowered by IT Central Station
We've improved our data management & human resource skills. Needs to work more on its presentation layer for users.Powered by IT Central Station
SAS Tools (SAS Enterprise Guide, SAS AML Solution, SAS Risk Management Solutions for Banks for Basell II Complaince and the Vendor is SAS...Continue Reading
Powered by IT Central Station
Valuable Features: - Community content in the Archer Exchange is very valuable - Easy to use - Highly configurable Room For Improvement:...Continue Reading
Powered by IT Central Station
Valuable Features: The Protegent surveillance suite of products automates many of the manual financial services / broker dealers compliance...Continue Reading
Manage Compliance strategies and best practices
Learn to apply best practices and optimize your operations.
Without governance, BYOD will quickly turn into mobile chaos. SearchCIO expert Bryan Barringer lays out the fundamentals of forming a mobility governance team. Continue Reading
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money. Continue Reading
Problem Solve Compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
Establishing policies for BYOD remains a top priority for CIOs, according to SearchCIO readers in our latest CIO Chatter. Continue Reading