Your Search returned 5 results from our Editorial content

Sort By
  • Close-button

    Regulatory Compliance

REGULATORY COMPLIANCE

Rant: Bring back the ducking stool for IT contracts

With an election looming, Britain’s scientists are calling on the government to do something. Anything. And Everything.

   

REGULATORY COMPLIANCE

HIPAA Compliance and Privacy Issues

Legislation is only ever as good as our command of the technology

   

BUSINESS MANAGEMENT

Extended SEPA deadline may keep German electronic payment...

A six-month deadline extension could be enough to keep Germany's electronics payment system running, new German Central Bank figures on SEPA payment adoption showed...

   

Your Search returned 48 results from our White Paper Library

Sort By
  • Close-button

    Regulatory Compliance

Symantec Corporation

Regulatory Compliance

Guidelines Toward Achieving Proactive Compliance

"Proactive Compliance" is a new way of approaching the compliance process. It looks beyond the mere obligation to pass an audit and embraces the compliance...


Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


IBM

Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


SAP

Regulatory Compliance

Foundations of GRC: Streamlining Compliance

Learn how to develop a streamlined compliance solution to maintain sustainability, consistency, efficiency, transparency and accountability.


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


IBM

Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


IBM

Master Data Management

Data Growth Challenges Demand Proactive Data Management...

Most organizations do not have a firm handle on how to manage their data growth, particularly unstructured, file-based information – the fastest growing...


IBM

Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


Previous 1 3 4 5

Blogs

mark-chillingworth

CIO Watch

Banks finally welcome cloud computing cover

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Bitcoin anonymity advocates ignore a darker truth

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

Watchdogs get tough on China’s US investments

Phil Muncaster reports on China and beyond

Most Recent Comments

no-image

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you think undersea data centers are a good idea?