New & Notable
Compliance strategies and best practices News
May 29, 2014
CFOs peppered a panel of security experts on how to establish security in a software as a service (SaaS) world.
January 22, 2013
The U. of Michigan CIO talks about embracing cloud solutions as part of a school-wide strategy of adopting cutting-edge tech to drive innovation.
September 18, 2012
Cloud service providers can serve their customers better by coaching them through gray areas of security and compliance.
March 26, 2012
Health care CIOs give vendors a laundry list of what they'll buy now, including HIPAA compliance and security help, iPad EHR interfaces and tools to improve interoperability.
Compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key. Continue Reading
Having trouble gaining upper-level support for security plans? In this video, learn how to build a one-page security roadmap with a cascade approach. Continue Reading
Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage. Continue Reading
Evaluate Compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Faster and safer than a car, easier to operate than a plane, more convenient than commercial flying, here comes the flying car -- again. Continue Reading
E-discovery and litigation concerns are serious responsibilities for IT staffs. Learn how to tackle them with this CIO Briefing. Continue Reading
Federated identity management groups and vendors toss up standards and solutions, as enterprises attempt to wrest control of user access to cloud-based applications. Continue Reading
Manage Compliance strategies and best practices
Learn to apply best practices and optimize your operations.
SaaS risk, part two: The C-suite can take part of the blame for shadow apps by encouraging IT to focus on money-making IT systems at the expense of other lines of business. Also, security tools that pay dividends for CIOs. Continue Reading
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money. Continue Reading
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model. Continue Reading
Problem Solve Compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
Establishing policies for BYOD remains a top priority for CIOs, according to SearchCIO readers in our latest CIO Chatter. Continue Reading
From data privacy scope to mapping laws to business requirements, Forrester Research outlines five steps to privacy and data protection governance. Continue Reading