Public Company Accounting Reform and Investor Protection Act

Compliance Journal

Subscribe to Compliance Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Compliance Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Compliance Journal
SYS-CON Events announced today that DivvyCloud will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. DivvyCloud software enables organizations to achieve their cloud computing goals by simplifying a...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, will show FinTechs how p...
For a while already we have been working with a large enterprise client, helping them to migrate their on-premise workloads to the cloud. Of course, as added value to the process, they are also migrating their legacy development processes to the modern, better, agile DevOps approach. A...
Technology is advancing at a rapid pace. To keep up, organizations must now take more strategic approaches to their business management solutions that support respective requirements. Today, in every organization, conflicting interests, misinformation, and fear of change make it diffic...
The unique combination of Amazon Web Services and Cloud Raxak, a Gartner Cool Vendor in IT Automation, provides a seamless and cost-effective way of securely moving on-premise IT workloads to Amazon Web Services. Any enterprise can now leverage the cloud, manage risk, and maintain cont...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall re...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with ...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at thi...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, d...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with ...
Successful transition from traditional IT to cloud computing requires three key ingredients: an IT architecture that allows companies to extend their internal best practices to the cloud, a cost point that allows economies of scale, and automated processes that manage risk exposure and...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU’s GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, d...
In the business world, it’s hard to throw a rock without hitting a compliance requirement. All must be obeyed, but some call for a high level of control and auditability. Governing bodies are exerting their authority like never before, increasing the number of auditors and handing out ...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across priv...
Businesses want to take advantage of the flexibility and cost benefits of running applications in the public cloud. To balance the benefits and risks, businesses need to deliver consistent security compliance across both private and public clouds. To develop their security compliance s...
Cryptography has become one of the most underappreciated, misunderstood components of technology. It’s too easy for salespeople to dismiss concerns with three letters that nobody wants to question. ‘Yes, of course, we use AES.’ But what exactly are you trusting to be the ultimate guar...
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud...
Banks face a difficult tug-of-war every day. Consumers demand innovative new services – regulators demand security, compliance and soundness of all offerings. How can a bank resist being pulled in every direction and find a middle ground? Banks can look to startup technology companies...
Recording and maintaining good evidence of testing is growing more important all the time. The ability to document what actually happened during the development of hardware or software is vital in many industries. Medical equipment is a great example, as any failure could lead to unexp...
Gigamon® on Thursday announced a partnership with Vistapointe, Inc. to provide mobile carriers with pervasive visibility and traffic intelligence to enhance network intelligence and insight. The combination of Big Data Traffic Intelligence from Gigamon and Vistapointe's network intelli...
Coalfire has launched HIPAAcentral, a new compliance exchange that provides a comprehensive suite of services for covered entities and business associates and their subcontractors to manage, maintain and exchange healthcare regulatory compliance data. “The U.S. Department of Health an...
Enterprises that rely heavily on fax, view regulatory compliance as a major business component. Non-compliance issues that arise from security breaches and other forms of information leakage often result in substantial regulatory penalties, both civil and criminal. As government regula...
Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
The people assigned to rethink the role of cloud computing by those charged with HIPAA best practices management and security have a daunting task on their hands these days. There are many decisions that should be made, and not a lot of emerging information and best practices. Howeve...
Electronic Data Interchange (EDI) allows businesses to send information to other businesses through electronic means instead of paper. A wide range of business documents can be sent with EDI, including invoices and purchase orders. Many companies prefer to use EDI because of the way it...
In the last five years, organizations have increasingly embraced cloud applications to help them innovate and transform their business. Applications that automate sales processes, HR management, collaboration, email and file sharing are growing fast and enabling organizations to meet t...
Just a few months ago I wrote a blog post about healthcare data on the cloud (HIPPA Cloud Storage) and the security concerns surrounding this very sensitive and valuable data. I mentioned that as with many industries, more healthcare data is being moved to the cloud, but the healthcare...
But what is malware and what makes it so particularly bad for your PC? Malware - short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Below is a list of the top ten things you may not, but should, k...
Learn about the complex regulations surrounding HIPAA compliance and other considerations for running sensitive data in the Cloud. In their session at the 12th International Cloud Expo, Frank Nydam, Director of Healthcare Solutions at VMware, and Ken Ziegler, CEO of Logicworks, will ...
Imagine there was a technology that could solve some of the top issues for IT managers of large companies: managing a large fleet of users’ devices, with all the associated maintenance tasks, and maintaining the security and integrity of devices by preventing malicious software install...
Despite the recent flood of high profile network breaches, hacking attempts are hardly new. In 1995, I was attending school in Helsinki when I discovered a password “sniffer” attack in our university network. In response, I wrote a program called the “secure shell” to safeguard informa...
Associated Surgeons and Physicians, LLC in Indiana went from zero to 100 percent virtualized infrastructure and as a result, met many compliance and efficiency goals. In part one of a two-part interview series, we discuss how a mid-market health services provider rapidly adopted serve...
When people think of "compliance" from a Microsoft SharePoint perspective, it can mean a lot of things to a lot of different people. Every organization will have different considerations for compliance: Essentially, which regulations they need to comply with according to their specific...
Identity management just isn’t what it used to be. Gone are the days when knowing who had access to what was simply enough. In today’s world of increasing government and industry regulation; networked communications and collaboration; and pervasive mobility, the requirements have funda...
Startup Convercent builds tools to fill void in GRC market by implementing and measuring compliance to corporate values and culture. GRC has traditionally provided companies with tools to help customers meet government and industry regulations, enforce corporate policies and better de...
EMC said Tuesday that it means to offer its cloud-based online file-sharing service Syncplicity, acquired last May, with its Isilon and Atmos widgetry so customers can store files as in the cloud as well as on-premise. The stuff’s in beta. It’s supposed to increase productivity, fl...
Evolving regulatory compliance requirements can be a major headache for the IT teams responsible for identity and access management (IAM). Sarbanes Oxley, the wide range of privacy regulations and other federal requirements, have transformed IAM from a problem that keeps the chief info...
When eGestalt of Santa Clara, CA, announced in November they were launching a cloud-based security and compliance solution, it set the stage to change the way enterprise businesses could cope with complex compliance and security issues. The solution, powered by Rapid7 scanning technol...
Companies are engaging customers and prospects on Facebook, Twitter, LinkedIn, and through blogs and posts on internal or external websites. But are they in compliance with legal requirements related to social media, not to mention privacy? Answering questions on every general counsel...