News

News

  • January 20, 2015 20 Jan'15

    Enterprise GRC jargon you're abandoning in 2015

    There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.

  • January 19, 2015 19 Jan'15

    2015 might be a big year for these GRC technologies

    This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.

  • January 13, 2015 13 Jan'15

    Top enterprise GRC and security predictions for 2015

    Can we leave the "year of the breach" title to 2014? In this #GRCChat recap, participants shared their enterprise GRC and security predictions for 2015.

  • January 07, 2015 07 Jan'15

    GRC 2015: What do you hope to achieve this year?

    A new year means a fresh start. In this #GRCChat recap, participants assess their current IT challenges and share their GRC 2015 resolutions.

  • January 06, 2015 06 Jan'15

    What were your top IT GRC regrets from 2014?

    Information security is moving up the priority list at many organizations. In this #GRCChat recap, participants look back at 2014 to discuss their top IT GRC regrets.

  • December 29, 2014 29 Dec'14

    Top 10 governance, risk and compliance strategy articles of 2014

    In our "Top 10 of 2014," find the most popular SearchCompliance articles from the past year offering advice on deploying a cutting-edge GRC strategy.

  • December 19, 2014 19 Dec'14

    Active defense: The perils of cybervigilantism

    Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.

  • December 17, 2014 17 Dec'14

    The future of active cyberdefense

    Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

  • December 10, 2014 10 Dec'14

    Offensive security in the enterprise: Examples, advice and cautions

    In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.

  • December 05, 2014 05 Dec'14

    Hacking back blurs line between active cyberdefense and cybercrime

    With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close