- December 17, 2014
Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.
- December 10, 2014
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
- December 05, 2014
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.
- November 13, 2014
As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.
- November 03, 2014
Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.
- October 29, 2014
In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.
- October 08, 2014
The prevalence of BYOD and cloud means corporate data is exposed to a wider risk landscape than ever before, security experts say. Learn how to make sure your mobile privacy and security policies can withstand modern threats.
- October 02, 2014
As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.
- September 26, 2014
Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.
- September 12, 2014
Participants in the latest #GRCchat discuss how to overcome the legal discovery challenges presented by vendor management and social media data.