Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
Combining compliance and security resources is difficult, but a company-wide risk assessment can help reduce redundant processes and improve GRC.
Brian Barnier, a keynote speaker at the GRC Summit in Boston this week, discusses the benefits of proactive risk assessment and crisis management.
In this #GRCchat recap, learn why remote device wipe is a good option for IT departments looking to safeguard data -- both corporate and personal.
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Google will throw down the gauntlet for Amazon Web Services this year with new two new features in Google Compute Engine, industry sources said.
VMware's vCloud Hybrid Service ramps up with more to come, as the company seeks to integrate private and public clouds for enterprise workloads.
A new Cloud Foundry foundation provokes debate about the fate of OpenStack-based PaaS efforts.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
Expert Nick Lewis details how the Tilon malware strain utilizes a unique communication protocol with its C&C infrastructure.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods.
TechTarget Storage Network 2014 Resource Guide
While software-defined storage eases management of storage applications, it doesn't do much for the hardware, so effective SRM is still necessary.
DataDirect Networks has expanded its WOS object storage to include global erasure coding and added a lower-cost hardware node for archiving.