News

News

  • July 28, 2016 28 Jul'16

    Privacy Shield gets regulators' stamp of approval

    The Privacy Shield data transfer pact finally received the green light from U.S. and EU privacy regulators, and businesses can begin registering to comply with the framework Aug. 1. Also in recent ...

  • July 15, 2016 15 Jul'16

    Gartner: Cybersecurity control a concern for digital businesses

    Digitization requires big changes to companies' strategic processes, and security is no different: In a recent report, Gartner predicts that 60% of digital businesses will experience major service ...

  • July 13, 2016 13 Jul'16

    New Jersey CTO targets compliance, security standards

    New Jersey's new chief technology officer has announced plans to boost data security by ramping up compliance monitoring in the state. In other GRC news, the Consumer Financial Protection Bureau ...

  • June 24, 2016 24 Jun'16

    Blockchain GRC: The innovation and regulatory balance

    Blockchain technology, a distributed ledger that underpins cryptocurrencies, has become a huge factor the financial services space as virtual currencies such as bitcoin have become increasingly popular. The rise of blockchain could radically change ...

  • June 17, 2016 17 Jun'16

    Medical records theft from NFL team's trainer could violate HIPAA

    Late last month, the NFL Players Association informed its member teams that a Washington Redskins trainer's laptop containing players' medical records was stolen and that it would collaborate with ...

  • Sponsored News

    • Scale-Out Storage Simplifies Planning

      “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More

    • Storage Quality of Service – A Tool for Reducing Hosting Contract Costs

      As cloud providers transition toward offering managed services, they must look for ways to reduce costs for their customers in an increasingly competitive market. One way of doing so is to take a multi-tenant approach to storage. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Using Information Governance to Mitigate Risk

      As greater challenges emerge in today’s data-centric business environment, organizations are placing more emphasis than ever upon risk mitigation. Not only are IT executives looking for ways to reduce their organizations’ risk profiles, but business leaders—including boards of directors—are making risk reduction an essential action item. See More

    View All Sponsored News
  • May 31, 2016 31 May'16

    As IoT and big data increase cyber risks, industry on the defensive

    The time isn’t far away when everything in our lives, from furniture to coffee pots, will have the ability to be "smart." Various reports estimate that there will be anywhere between 30 to 200 ...

  • May 05, 2016 05 May'16

    PCI DSS 3.2 multifactor requirement among the version's biggest changes

    Details surrounding the updated Payment Card Industry Data Security Standard show that version 3.2 includes new multifactor authentication and encryption requirements. Also in recent GRC news: SEC ...

  • April 15, 2016 15 Apr'16

    FCC's consumer privacy proposal: Harmful to innovation?

    The FCC's newly proposed privacy protection rules requires broadband and wireless providers to obtain consumer consent before collecting and sharing their data, but some are concerned this approach ...

  • March 31, 2016 31 Mar'16

    SecureWorld Boston highlights value of partnerships

    Some 1,500 cybersecurity professionals gathered at this week's SecureWorld Boston conference that featured discussions with leading industry experts about today's best cybersecurity practices. The ...

  • March 08, 2016 08 Mar'16

    RSA 2016: Adobe, Google and Microsoft prepare for EU GDPR

    When General Data Protection Regulation -- a new EU-wide data protection framework that will replace Safe Harbor -- was introduced by European Union on December 2015, global companies such as Adobe ...

  • February 19, 2016 19 Feb'16

    Apple, FBI face off in iPhone backdoor debate

    This week, Apple chief Tim Cook said in a letter to the company's customers that it won't give in to the FBI's demand to create an iPhone backdoor. Plus, the number of resolved FCPA enforcement ...

  • February 16, 2016 16 Feb'16

    Beyond BYOD: How IoT and new tech are changing modern GRC

    Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the ...

  • February 05, 2016 05 Feb'16

    Barclays, Credit Suisse to pay $154M for 'dark pool' trading violations

    The U.S. Securities and Exchange commission announced last week that global banks Barclays and Credit Suisse would pay a record total of more than $154 million to settle allegations over "dark ...

  • January 07, 2016 07 Jan'16

    Repeat HIPAA violators face minimal ramifications

    Despite several HIPAA violations, recent data analysis found U.S. healthcare providers such as CVS and the VA face few punitive actions. Also in recent GRC headlines: Companies have two more years ...

  • December 29, 2015 29 Dec'15

    Top 2015 compliance stories: Data challenges and security issues

    We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close