Public Company Accounting Reform and Investor Protection Act

Compliance Journal

Subscribe to Compliance Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Compliance Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Compliance Journal
A common misconception about the cloud is that one size fits all. Companies expecting to run all of their operations using one cloud solution or service must realize that doing so is akin to forcing the totality of their business functionality into a straightjacket. Unlocking the full ...
For most organizations, the move to hybrid cloud is now a question of when, not if. Fully 82% of enterprises plan to have a hybrid cloud strategy this year, according to Infoholic Research. The worldwide hybrid cloud computing market is expected to grow about 34% annually over the next...
The past decade has seen an increasing trend in employees using mobile devices like smartphones and tablets to aid in their work. This trend has fostered organizations to adopt practices like bring-your-own-device (BYOD) with hopes of improving employee productivity and efficiency. The...
Ask any IT person from the financial sector about SOX requirements and they’ll probably use some colorful language about how much time and money it sucks away. According to the 2016 Sarbanes-Oxley compliance survey by global consultant Protiviti, the average annual internal cost of SOX...
“Oh, somewhere in this favoured land the sun is shining bright, The band is playing somewhere, and somewhere hearts are light; And somewhere men are laughing, and somewhere children shout, But there is no joy in Mudville—mighty Casey has struck out.” – Casey At The Bat Mighty Cas...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall re...
Cybersecurity is a complex field, and with laws varying across states and countries, keeping cloud usage compliant can become a real headache for enterprise security decision-makers. As regulations continue to lag behind the rapid pace of technological advancements, many IT security pr...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across priv...
The Rules and Regulations Chances are you’ve heard a lot about compliance standards, especially if you are a CSO, CTO or CIO (and if you’re in-house counsel, chances are you have said compliance standards memorized). Lawmakers and regulators around the world are enhancing existing data...
Datameer has just announced their introduction of new data governance capabilities in a Hadoop environment. This is a push towards assisting organizations with data quality, security and compliance problems that result from the growth of analytics tools by business users. With Datameer...
You may not recognize its name, but you’re sure to have frequented one of its venues. Buffalo, NY-based Delaware North manages and provides food and beverage […]
As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity. We encounter so many standards in the corporate worl...
If you’re a sports fan, this Saturday is a BIG day. The Kentucky Derby will be run, The NFL Draft will be ongoing, Red Sox and Yankees will meet at Fenway Park, and to cap it off that night, Floyd Mayweather takes on Manny Pacquiao in one of boxing’s biggest matchups in history. ...
Sarbanes-Oxley (SOX) compliance—it’s like checking for holes in your favorite pair, but with consequences beyond public embarrassment. For publicly traded companies, the ordeal is a bit like income tax preparation for the rest of us: a painful, time-consuming evil that—if not ...
In a world where privacy and security are among top concerns for businesses and consumers alike, Aria Systems is proud to announce Health Insurance Portability and Accountability Act of 1996 (HIPAA) certification. HIPAA sets the requirements for protecting patient data for any organiza...
Orbograph is an innovative healthcare ISV that provides Healthcare Revenue Cycle Management (HRCM) solutions, online medical scheduling, PHR, and other services to hospitals and clinics. The Leader: Ran Rothschild, Director of Operations The Project: The company’s next generation of ...
Agile and lean methodologies are undeniably here to stay. As organizations look to accelerate the SDLC, the entire team has to contribute to quality. That's where Development Testing comes into play. For both enterprise and embedded development, organizations are increasingly ...
Cloud computing is finally hitting the IT world in the way that’s been predicted for the past decade or so. Cloud computing simply makes sense for most organizations. It allos you to distribute IT costs over time without having to make huge capital investments. It gives you ex...
Bill Schmarzo 2014 was a good year for big data, and for some of my big data blogs.  This is my annual “My Top 10 Blogs” list.  Choosing 10 forces me to exclude some interesting topics, such as my Big Data MBA series from my teaching stint at the University of San Francisco.  Fortunate...
​This article was authored by David Guimbellot and was originally published on Orasi's "Eye on Quality" blog. If your business is capturing or coordinating persistent data as a primary function then it behooves you to create a data quality initiative that improves your Test Data Man...
At first glance, it might seem that the goals of DevOps and regulatory compliance are inherently at odds. Whereas much of the buzz around DevOps advocates delivering software at dizzying rates, compliance and security are concerned with proper oversight of the change management process...
Managed services have been gaining serious ground in small and medium-sized businesses in the past couple of years. While enterprises and larger businesses have been moving toward managed services for the better part of the last decade, smaller organizations have been more hesitant ove...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data. There is no doubt data protection in the cloud computing era is never going to be a ‘...
Expansive feature lists can make any managed file transfer (MFT) solution sound attractive. But what counts are the features you’ll use, and identifying them prior to actually implementing MFT can generate a storm of confusion. While every organization should determine which features m...
While regulatory standards can vary greatly from one industry to the next, very few organizations are free of compliance requirements when it comes to data and IT assets. Compliance concerns can play a major role in a number of different areas, including risk management. When disposing...
By Albert Fruz Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. ...
Concorde Solutions warns organisations to beware the cloud when it comes to licensing, and always negotiateSupport for Windows XP finally came to a halt last month and many companies still using the operating system faced an inevitable realisation when upgrading: prices for IT assets h...
Charles Noell joins Board bringing with him his experience as a technology investorConcorde Solutions, a leading provider of business analytics for managing software compliance, vendor performance and spend across Hybrid IT, has secured a multi-million dollar investment. The company ra...
Did you catch the selfie that the Red Sox’s David Ortiz took with President Barack Obama? That was a great instance of cultural zeitgeist, wasn’t it? However, Samsung also has a deal with Ortiz that let it use the shot (taken with a Galaxy Note 3) in a Twitter ad — an...
New FlexNet Producer Suite release simplifies subscription, cloud- and usage-based licensing while eliminating the risk of revenue leakage from non-compliant use in virtualised environmentsMaidenhead, UK - April 2, 2014 - Flexera Software, the leading provider of Application Usage Mana...
In 2008, the size of the cloud computing industry was $46 Billion. That is more than the GDP of Costa Rica! Think it’s a lot? Ready to jump on the cloud security bandwagon? That was 2008! In 2014, the size of the cloud computing industry has more than tripled to $150 Billion – almost t...
February is upon us and with it, the pink, the red, the chocolate, and the teddy bears of Valentine’s Day.  Though love is in the air, at least at retail establishments throughout the country, a recent data breach of Cupid Media’s dating site reminds us that we must remain adamant abou...
Happy New Year, friends and colleagues.  As we embark on this new journey of a cloud security tip each month, we are overwhelmed by the news of the recent Target data breach during the busy holiday shopping season, which affected 70 million customers, whose credit/debit card informatio...
Static analysis, unit testing, and specific safety-critical compliance initiatives (DO-178C, ISO 26262, MISRA 2012, FDA, etc.) topped the list of Parasoft's most-requested embedded testing resources of 2013.  Getting Down to Business: Leveraging the Right Static Analysis [AR...
Static analysis, unit testing, and specific safety-critical compliance initiatives (DO-178C, ISO 26262, MISRA 2012, FDA, etc.) topped the list of Parasoft's most-requested embedded testing resources of 2013. 
Government laws and industry regulations in the United States and around the world mandate protection of sensitive data. Data must be secure when at rest, during transactions and when it transverses network connections. Each industry has specific regulations, which are commonly used in...
There was a study done with chimpanzees a couple of decades ago. Researchers put a collection of chimps in an enclosure from the top of which they hung a bunch of bananas. Every time a chimp went for the bananas, they blasted it with a water cannon. As you would expect, any chimp that ...
We hear people often talk about “taking initiative.” Sure, it’s an important quality for Millennials to possess, but what does it mean to “have initiative”? What does it look like in practice? Today’s News To Live By runs on 100% Initiative. It’s like supreme-grade fuel that costs noth...