Compliance strategies and best practices

Compliance strategies and best practices News

  • February 27, 2015 27 Feb'15

    Government CIO launches IT shared services marketplace

    A shared technology services marketplace, like the one recently implemented by Oakland County, Mich., offers a variety of benefits to governments constrained by tight budgets, including more affordable prices for services and interesting ...

  • December 17, 2014 17 Dec'14

    The future of active cyberdefense

    Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

  • December 10, 2014 10 Dec'14

    Offensive security in the enterprise: Examples, advice and cautions

    In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.

  • August 15, 2014 15 Aug'14

    While SpiderOak canary defies NSA, CIOs ponder their privacy bind

    CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.

View All News

Compliance strategies and best practices Get Started

Bring yourself up to speed with our introductory content

  • field-level encryption

    Field-level encryption is the ability to encrypt data based on entire fields. Continue Reading

  • shadow app

    A shadow app is a software program that is not supported by an employee's information technology (IT) department. Continue Reading

  • Honey Encryption

    Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading

View All Get Started

Evaluate Compliance strategies and best practices Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Compliance strategies and best practices

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Compliance strategies and best practices Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close