Information technology laws News
July 01, 2016
For CIOs, the U.K.-EU split opens up a continent of unknowns. Also in Searchlight: Cisco locks on to security startup CloudLock; IBM woos blockchain coders; $4 smartphones hit India.
March 18, 2016
Spreading cybercrime, like the ransomware attacks on NYT and BBC, has Congress considering Bitcoin security. Also in Searchlight: Apple might boost iCloud encryption; Amazon eyes selfie payments.
March 04, 2016
The message from RSA Conference 2016: Build security into IoT devices early on, or court disaster. Also in Searchlight: Apple gets a boost; a chance to 'hack the Pentagon.'
February 26, 2016
The Apple-FBI case is igniting an enterprise-wide discussion on privacy versus security. What CIOs need to know. Also in Searchlight: Facebook's population map; Intel's latest diversity push.
Information technology laws Get Started
Bring yourself up to speed with our introductory content
Companies are eyeing data assets as the new cash cow, but monetizing data is hard to do, warn data monetization experts Lydia Jones and Karl Urich. Here's what you need to know. Continue Reading
Modern companies generate and store an unprecedented amount of big data, but an information governance policy can help businesses stay compliant and reap the benefits of their digital assets. Continue Reading
The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Information technology laws Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem. Continue Reading
Legal teams play a key supporting role in successful information security programs. Expert Mike Chapple reviews three areas where infosec pros and lawyers should work together, and offers tips to foster effective collaboration. Continue Reading
Cloud service provider execs from Microsoft, Amazon.com, Rackspace and Salesforce.com take on the intricacies of SLAs and data ownership. Continue Reading
Manage Information technology laws
Learn to apply best practices and optimize your operations.
The EU has agreed upon a radical set of data protection rules. What does it mean for U.S. IT execs? Also in Searchlight: Apple has a new COO; Republican candidates fumble on tech knowledge. Continue Reading
Every enterprise must have a viable strategy for protecting high-value data. See if your plan aligns with Francoise Gilbert's advice on top priorities to consider when defining data governance plans. Continue Reading
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
Problem Solve Information technology laws Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CIO tip: Companies are getting serious about risk management plans -- and leaning on CIOs to help them. Continue Reading
Email does not drive records retention policy -- it's about what's in the email. With a few simple steps you can help prevent electronic discovery surprises and costly fines. Continue Reading
There's an elephant in the e-discovery room: data security, in the form of porous networks, sophisticated hackers, malicious insiders and altered electronic records. Continue Reading