Your Search returned 8 results from our Editorial content

Sort By
  • Close-button

    Regulatory Compliance

REGULATORY COMPLIANCE

Brexit means GDPR and unhindered data flows

Minister of State for Digital and Culture Matt Hancock reaffirms that Britain wants data flows, but little else.

   

REGULATORY COMPLIANCE

A legal viewpoint on the tech supply chain scandals

Research shows tech companies need to press the reset button on human rights due diligence

   

REGULATORY COMPLIANCE

Rant: Bring back the ducking stool for IT contracts

With an election looming, Britain’s scientists are calling on the government to do something. Anything. And Everything.

   

REGULATORY COMPLIANCE

HIPAA Compliance and Privacy Issues

Legislation is only ever as good as our command of the technology

BUSINESS MANAGEMENT

Extended SEPA deadline may keep German electronic payment...

A six-month deadline extension could be enough to keep Germany's electronics payment system running, new German Central Bank figures on SEPA payment adoption showed...

   
   

Your Search returned 74 results from our White Paper Library

Sort By
  • Close-button

    Regulatory Compliance

Oracle

Regulatory Compliance

Make Compliance Work For You

Discover the five important steps to build embedded compliance architecture. Read on to learn how to deliver the best possible value for your IT budget...


Symantec Corporation

Data Privacy and Security

Anatomy of a Data Breach

For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the...


IBM

Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


SAP

Regulatory Compliance

Foundations of GRC: Streamlining Compliance

Learn how to develop a streamlined compliance solution to maintain sustainability, consistency, efficiency, transparency and accountability.


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


IBM

Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


IBM

Master Data Management

Data Growth Challenges Demand Proactive Data Management...

Most organizations do not have a firm handle on how to manage their data growth, particularly unstructured, file-based information – the fastest growing...


IBM

Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


EMC Corporation

Records Management

Managing Public Sector Records with Microsoft SharePoint...

Read this EMC overview to learn about an effective, joint records capture and management solution using EMC Captiva and Microsoft Sharepoint that helps...


Previous 1 3 4 5 6 7 8

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?