- May 05, 2016
Details surrounding the updated Payment Card Industry Data Security Standard show that version 3.2 includes new multifactor authentication and encryption requirements. Also in recent GRC news: SEC ...
- April 15, 2016
The FCC's newly proposed privacy protection rules requires broadband and wireless providers to obtain consumer consent before collecting and sharing their data, but some are concerned this approach ...
- March 31, 2016
Some 1,500 cybersecurity professionals gathered at this week's SecureWorld Boston conference that featured discussions with leading industry experts about today's best cybersecurity practices. The ...
- March 08, 2016
When General Data Protection Regulation -- a new EU-wide data protection framework that will replace Safe Harbor -- was introduced by European Union on December 2015, global companies such as Adobe ...
- February 19, 2016
This week, Apple chief Tim Cook said in a letter to the company's customers that it won't give in to the FBI's demand to create an iPhone backdoor. Plus, the number of resolved FCPA enforcement ...
Sponsored by SolidFire - “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More
Sponsored by SolidFire - As cloud providers transition toward offering managed services, they must look for ways to reduce costs for their customers in an increasingly competitive market. One way of doing so is to take a multi-tenant approach to storage. See More
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
Sponsored by Symantec - As greater challenges emerge in today’s data-centric business environment, organizations are placing more emphasis than ever upon risk mitigation. Not only are IT executives looking for ways to reduce their organizations’ risk profiles, but business leaders—including boards of directors—are making risk reduction an essential action item. See More
- February 16, 2016
Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the ...
- February 05, 2016
The U.S. Securities and Exchange commission announced last week that global banks Barclays and Credit Suisse would pay a record total of more than $154 million to settle allegations over "dark ...
- January 07, 2016
Despite several HIPAA violations, recent data analysis found U.S. healthcare providers such as CVS and the VA face few punitive actions. Also in recent GRC headlines: Companies have two more years ...
- December 29, 2015
We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.
- December 09, 2015
The governor of New York has introduced new state banking rules designed to curb money laundering and block terrorism funding. Also in recent GRC news: Most healthcare organizations lack ...
- December 03, 2015
New laws encourage cybersecurity information sharing between the public and private sector, but will the data protection measures infringe on privacy?
- December 02, 2015
As organizations' data threats and regulatory demands increase, GRC professionals are seeing their IT compliance management skill sets become highly prized across industries.
- November 25, 2015
In the wake of the horrific attacks in Paris earlier this month, government and intelligence officials pointed a finger at end-to-end encryption (E2EE) and how it enabled attackers to "go dark" -- ...
- November 18, 2015
(This blog post was written by Diane K. Carlisle, executive director of content at ARMA International.) Day by day, effective information governance (IG) is made more urgent and more complicated by ...
- November 12, 2015
In recent regulatory compliance news, the Federal Reserve Chairwoman testified before a House panel that very large U.S. banks still experience "substantial" GRC management failures; recent ...