June 26, 2015
June 05, 2015
This week, Tim Cook delivered strong words on consumer privacy and how other digital companies do business. Also in Searchlight: Caitlyn Jenner beats Obama's Twitter record; Yahoo will live-stream an ESPN game.
February 18, 2015
Box wants to make the cloud your default location for classified data. Also in Searchlight: Your Samsung Smart TV might be eavesdropping; Apple takes off with JetBlue.
October 02, 2014
As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
Microsoft HealthVault, which launched in October 2007, is a free personal health record (PHR) service offered by Microsoft that allows individuals to store personal health and fitness information in a central location. The Web-based service is available to anyone with a Microsoft account. Continue Reading
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts. Continue Reading
Learn to apply best practices and optimize your operations.
As information is increasingly stored and handled outside the traditional corporate network, companies must ensure their mobile policy addresses their organization's unique compliance obligations. In this SearchCompliance handbook, learn BYOD compliance and information management strategies to keep mobile data safe.
In the first piece, contributor Bryan Barringer provides strategies for preparing and implementing a mobile data management policy that steers clear of compliance violations. In the second piece, Jeffrey Jenkins examines best practices such as continuous monitoring and third-party vetting that can help ensure long-term mobile security and compliance. And in our final piece, Fran Sales reports on why mobile security and privacy policies are vital to business success, especially as regulators pay closer attention to corporate data stored on devices. Continue Reading
Security breaches often have privacy implications, but IT must take extra steps to specifically protect mobile users' personal information. Continue Reading
Data retention policy is inherent to Sarbanes Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant. Continue Reading
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When implementing BYOD, employee privacy is often overlooked. Here's how to craft an enterprise BYOD policy that avoids potential legal complications. Continue Reading
It's important to respect end users' BYOD privacy, but balancing their rights and your organization's security can be a tricky task. Continue Reading