compliance
BlackSwan Unveils an AI OS
An Israeli software services developer debuting this week positions its platform service as an enterprise AI operating system that combines deep and machine learning, natural language processing, neural networks ...Full Article
Licensing Reform Movement Gathers Steam
An effort to promote balanced licensing rules for open source software is gaining momentum with the addition of 14 new companies adopting guidelines designed primarily to reduce compliance errors. ...Full Article
Public Cloud-based Compliance Storage: How to Do It Right
Electronic disk storage became popular in the early 2000’s for archive and compliance storage. SEC Rule 17a-4 is the federal regulation that requires broker-dealers and other regulated companies to ...Full Article
It’s Game, Set, Match for Regulating Cloud Data
Like America's love of tennis, the cloud economy is growing exponentially. As organizations aggressively push cloud adoption, more sensitive and regulated data ends up in the hands of outside ...Full Article
How to Mitigate Third-Party Data Breach Risks
University of Pittsburg Medical Center (UPMC) is one of the latest healthcare organizations to have sensitive records exposed. This breach should trigger a wake-up call for healthcare organizations -- ...Full Article
How to Protect Your Data from Third-Party Breaches
The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage ...Full Article
Audit Your Cloud for Security and Savings
By auditing their organizations' cloud implementations, IT departments can rein in security risks, curtail costs, improve end-user services, and enhance relationships with departments. Once IT professionals know the extent ...Full Article
Bring Shadow IT Out of the Dark, Gartner Tells Tech
Mention shadow IT to many technology professionals and they'll shudder before trading war stories. But to empower their organizations to innovate, grow, and succeed, IT departments must embrace and manage this ...Full Article
Can CIP Compliance Stymie a Cyber Attack?
<img src="http://media2.hpcwire.com/dmr/uspowergrid.gif" alt="" width="95" height="57" />In the wake of the destruction caused by Hurricane Sandy, it's not difficult to imagine the damage that's possible when the power grid is ...Full Article