In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.
This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
This E-guide from SearchHealthIT.com discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.
This resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now.
This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.