Data Management Documentation

Posted on

What it is – and why it matters You’ve done enough research to know that data management is an important first step in dealing with big data or starting any analytics project. But you’re not too proud to admit that you’re still confused about the differences between master data management and data federation. Or maybe […]

Mobile Networking Takes the Next Step

Posted on

To support mobile devices, organizations should consider new technologies to boost the speed, security and management capabilities of their networks. NETWORK SECURITY IS a huge challenge for organizations that have yet to determine how to efficiently manage mobile and cloud technologies. Users won’t relent until they have access to business applications and content available on their own […]

Six ITGC audit controls to improve business continuity

Posted on

An IT General Controls audit examines how well IT systems and applications are performing. If an audit indicates that certain controls are not being done correctly, those issues are considered risks to the IT department and its ability to function. Nearly every one of the 18 items in six controls listed below is designed to […]

The 11 Security Commandments

Posted on

  The 11 Security Commandments The Jericho Forum commandments define both the areas and the principles that must be observed when planning for a de-perimeterized future. Whilst building on “good security”, the commandments specifically address those areas of security that are necessary to deliver a de-perimeterized vision. The commandments serve as a benchmark by which […]