- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- December 01, 2011
- November 29, 2011
Federal governments all over the world have become increasingly hands-on with cybersecurity strategy and online privacy, but businesses have sometimes been critical of new rules that they say will ...
- November 23, 2011
In 2011, mobile malware and targeted attacks against big-name companies were among the top online security threats. Here’s why you need to prepare for more of the same in 2012.
- November 21, 2011
Information risk management impacts each and every one of us both professionally and personally. Yet we still can’t seem to properly grasp managing information risk and put it into action. The ...
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- November 17, 2011
It was the shot heard round the social media world: This week, a Facebook spam attack resulted in pornographic and violent images showing up on users’ news feeds. Facebook has always prided itself ...
- November 14, 2011
A few months ago, it was Google in regulators' crosshairs. In the past couple of weeks, however, it seems that Facebook is regulators' new focus, as they push for consumer data protection. Facebook ...
- November 10, 2011
Our roundup of IT compliance tools highlights new security features from both GFI Software and Guidance Software, and a risk management dashboard from Dow Jones Risk & Compliance.
- November 07, 2011
Early in my career I was influenced by the work of Christopher Alexander, an architecture professor at the University of California, Berkeley. Alexander and his team researched and cataloged ...
- October 31, 2011
National Cybersecurity Awareness Month has drawn to a close, but it's clear that much still needs to be done to protect information online. One recent survey has found that small businesses - which ...
- October 24, 2011
- October 18, 2011
After hackers gained access to the personal information of more than 100 million user accounts last spring, Sony overhauled online security and created a chief information security officer (CISO) ...
- October 17, 2011
Compliance means different things to different people. Indeed, regulatory compliance requirements are -- and should be -- handled differently based on the unique needs of the business. The ugly ...
- October 10, 2011
October is National Cybersecurity Awareness Month, and the overarching theme this year is to spread awareness of every Internet user's role in securing their information. In other words, YOU are ...
- October 03, 2011
October is National Cyber Security Awareness Month, and this year's theme is meant to remind individuals of their role in securing information, as well as the devices and the networks they use. ...