compliance - News, Features, and Slideshows

News

  • EU data supervisor probes EU bodies' software deals with Microsoft

    The 28-country European Union adopted the landmark General Data Protection Regulation (GDPR) about a year ago, giving Europeans more control over their online information and privacy enforcers the power to impose hefty fines

    Written by Reuters09 April 19 06:14
  • The CIO as CTO, CMO and CDO

    Jason Delamore of Auckland Airport explains why his combined role works well in a highly complex, fast moving environment

    Written by Divina Paredes12 Sept. 18 06:30
  • CIO upfront: The compliance conundrum of digital transformation

    Regulators are focusing more and more on data and records, resulting in a myriad of regulations that businesses are required to comply with when creating, storing and using data, writes Paul Bruton of Hitachi Data Systems

    Written by Edited by Divina Paredes11 Aug. 17 06:30
  • Opinion: 4 reasons why CIOs should really care about Windows Server 2003 end of support

    Would you step into an old but functioning lift that is no longer getting maintenance support from its manufacturer? That’s the question CIOs should also ask themselves when looking at IT inventory that is obsolete but still working, according to Arun Ulagaratchagan, general manager, cloud and enterprise group, Microsoft Asia Pacific.

    Written by Edited by Divina Paredes23 April 15 05:30
  • Are businesses rushing to BYOD too quickly?

    A survey of IT executives and IT pros paints a disturbing picture of BYOD. That picture includes a lack of confidence in compliance with federally mandated regulations, a fear that sensitive data is at risk and uncertainty about the overall effectiveness of BYOD.

    Written by Tom Kaneshige30 July 13 18:20
  • Identify compliance exceptions - before the auditors arrive

    The ability to effectively and efficiently audit IT security has never been more important. Whether internal or external, financial or operational, business or regulatory, audits are increasingly performed of IT controls and IT security. This increase is driven by the need of the business and auditors to rely on internal controls, the requirement to effectively manage risk, along with the role of the auditor in assessing compliance with regulations, policies and standards.
    IT auditors often leverage manual procedures, scripts and network vulnerability scanners when auditing technical IT security. Unfortunately, these are fraught with challenges and limitations and often create an undue burden on the auditor.

    Written by Martin Mooney07 Aug. 11 22:00
  • Beware spreadsheet complacency

    They are cheap, widely used, highly effective, and dangerous if not used under proper supervision.
    Spreadsheets, starting in the 1980s with the humble Lotus 123, have evolved into formidable analytical engines, and are heavily used for planning and forecasting in businesses and for drawing up statutory accounts and reports.

    Written by Kevin Chinnery20 Sept. 09 22:00