IT Compliance Advisor:

IT compliance


December 13, 2010  4:05 PM

WikiLeaks shows how better compliance technology can protect data



Posted by: Fohlhorst
CIO, data protection, IT compliance, Wikileaks

The latest WikiLeaks debacle hopefully pounds home the point to corporate IT shops why

December 7, 2010  4:38 PM

Can you help us predict the IT compliance future?



Posted by: Ben Cole
CIO, IT compliance, national cybersecurity bill

What will be the issues, trends and developments that will have the biggest impact on the IT compliance world in 2011? We here at SearchCompliance.com have our own thoughts about that, but we would like to know what you think. Will the proposed


March 26, 2010  3:50 PM

SEC provides additional guidance on XBRL compliance



Posted by: GuyPardon
compliance, financial regulations, IT compliance, SEC, XBRL, XBRL compliance

In a public seminar held earlier this week on eXtensible Business Reporting Language (XBRL) compliance, the Securities and Exchange Commission (SEC) offered further guidance on how it expects companies to file their interactive financial records. Mark Green, senior special counsel at the...


March 11, 2010  9:15 PM

Web application security matters, even without a compliance mandate



Posted by: GuyPardon
app security, Application security, compliance, IT compliance, online security, top Web hacks, Web application security

Jeremiah Grossman, the CTO of White Hat Security, has been at the forefront of documenting the dangers of Web application security. As he points out on his blog, however, state and federal regulations are lagging behind in addressing Web application security, even though many enterprises are...


February 24, 2010  10:10 PM

CloudAudit.org to offer tools for verifying cloud computing compliance



Posted by: GuyPardon
Audit, Cloud computing, compliance audit, compliance in the cloud, IT compliance, regulatory compliance

The Automated Audit, Assertion, Assessment, and Assurance API (A6) working group is newly organized under the brand of CloudAudit. The stated goal of CloudAudit is to “provide a common interface that allows cloud providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their...


December 8, 2009  12:39 PM

Yahoo adds online privacy tool ahead of expected FTC compliance rules



Posted by: GuyPardon
Advertising, behavioral marketing, behavioral targeting, compliance, Federal Trade Commission, FTC, Google, Internet marketing, Internet privacy, IT compliance, Jon Leibowitz, Microsoft, online privacy, Security, Yahoo, Yahoo and Microsoft

FTC compliance now means new rules for social media marketing. By next year, FTC compliance could also mean ensuring that online advertising doesn’t violate tougher consumer privacy...


December 1, 2009  4:34 PM

IT governance, risk and compliance: Buzzword or not, GRC is relevant



Posted by: GuyPardon
carbon compliance, Carbon footprint, compliance, GRC, GTC software, IT compliance, IT governance, regulatory compliance, risk management

As IT professionals log back in after the Thanksgiving holiday break, meeting regulatory compliance mandates continues to occupy significant amounts of both time and...


September 28, 2009  9:23 PM

Information security and compliance resources from around TechTarget



Posted by: GuyPardon
compliance, Health care, Health Insurance Portability and Accountability Act, HITECH, Information security, IT compliance, Payment card industry, PCI DSS, policy, Security, Wired Equivalent Privacy

The laws and regulations that CIOs and CISOs must understand and reflect in their operations are by nature applicable to many different areas of information technology. As a recent study on the privacy profession showed,


September 3, 2009  8:16 PM

Evaluating the cybersecurity plan and the role of a federal CISO



Posted by: GuyPardon
CISO, compliance, cybersecurity, FISMA, Government, IT compliance, Security, strategy, U.S. Department of Homeland Security, United States Department of Homeland Security

Patricia TitusIn this episode of the IT Compliance Advisor, Associate Editor Alexander B. Howard interviews Patricia Titus about the Obama Administration’s cybersecurity plan,...


August 21, 2009  4:10 PM

Clarifying mobile encryption requirements for 201 CMR 17.00 compliance



Posted by: GuyPardon
201 CMR 17.00, business, Chief information officer, CIO, compliance, data protection, encryption, IT compliance, Mobile phone, Open source, Personally identifiable information

When I reported on amendments to the Massachusetts data protection law earlier this week, one of the comments that undersecretary of consumer affairs Barbara Anthony made was a point of interest...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: