-
vBlog: Regulatory Compliance vs Operational Readiness (3 of 4): HIPAA
This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more
-
vBlog: Regulatory Compliance vs Operational Readiness (2 of 4): SEC and SOX
This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more
-
vBlog: Regulatory Compliance vs Operational Readiness (1 of 4)
This month, I am taking a look at the differences between ‘Regulatory Compliance’ and ‘Operational Readiness’ through a series of videos. Regulatory Compliance The efforts to check the boxes before audits – often mandated by an industry (e.g. HIPAA), corporate… Read more
-
Discussing Data Protection with IBM
Last week, I had the opportunity to sit down with Tom Hughes and Todd Watson from IBM. We talked about three IT trends that are disrupting traditional data protection strategies and legacy approaches: Highly Virtualized / Private Cloud Infrastructures Cloud-based… Read more
-
Trends in Virtualization Protection (video)
Easily one of the most discussed topics with me in 2012 is how virtualization is changing data protection strategies. Virtualization solves so many problems for IT that it continues to become more mainstream every day. But the more that you… Read more
-
Data Protection in a BYOD World
One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets). Frankly, most IT organizations weren’t able to do an effective job of protecting that data… Read more