New & Notable
Compliance strategies and best practices News
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
May 29, 2014
CFOs peppered a panel of security experts on how to establish security in a software as a service (SaaS) world.
January 22, 2013
The U. of Michigan CIO talks about embracing cloud solutions as part of a school-wide strategy of adopting cutting-edge tech to drive innovation.
September 18, 2012
Cloud service providers can serve their customers better by coaching them through gray areas of security and compliance.
Compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and ... Continue Reading
Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading
Having trouble gaining upper-level support for security plans? In this video, learn how to build a one-page security roadmap with a cascade approach. Continue Reading
Evaluate Compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Faster and safer than a car, easier to operate than a plane, more convenient than commercial flying, here comes the flying car -- again. Continue Reading
Health care CIOs give vendors a laundry list of what they'll buy now, including HIPAA compliance and security help, iPad EHR interfaces and tools to improve interoperability. Continue Reading
E-discovery and litigation concerns are serious responsibilities for IT staffs. Learn how to tackle them with this CIO Briefing. Continue Reading
Manage Compliance strategies and best practices
Learn to apply best practices and optimize your operations.
Without governance, BYOD will quickly turn into mobile chaos. SearchCIO expert Bryan Barringer lays out the fundamentals of forming a mobility governance team. Continue Reading
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money. Continue Reading
Problem Solve Compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
Establishing policies for BYOD remains a top priority for CIOs, according to SearchCIO readers in our latest CIO Chatter. Continue Reading