- March 26, 2010
In a public seminar held earlier this week on eXtensible Business Reporting Language (XBRL) compliance, the Securities and Exchange Commission (SEC) offered further guidance on how it expects ...
- March 24, 2010
FTC experts recommend the creation of new online privacy frameworks that can keep pace with technology.
- March 23, 2010
A revision of the Cybersecurity Act removes an Internet kill-switch provision, clarifies certification and expands public-private cooperation on federal cybersecurity compliance.
- March 16, 2010
As more legislation on P2P file-sharing security risks makes its way into the Senate, the FTC offers guidance to protect against data breaches.
- March 15, 2010
Real-time compliance, social networking security, evolving cybersecurity threats and cloud computing compliance were among the top themes at RSA Conference 2010.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- March 12, 2010
An RSA Conference Advisory Board roundtable offered advice on security trends, including social networking security, online privacy risk and usercentric authentication.
- March 11, 2010
Jeremiah Grossman, the CTO of White Hat Security, has been at the forefront of documenting the dangers of Web application security. As he points out on his blog, however, state and federal ...
- March 08, 2010
If your company is finding it difficult to weigh the costs vs. benefits of a formal risk management program, Standard & Poor’s (S&P) feels your pain. I caught up with Steven Dryer, managing ...
- March 08, 2010
How should an enterprise risk management strategy affect a company's credit ratings? Standard & Poor's is still trying to figure that out. Find out why.
- March 05, 2010
The Open Identity Exchange trust framework will enable the secure authentication and exchange of online identity credentials across public and private sectors.
- February 26, 2010
This afternoon, the Department of Defense (DoD) announced the release of its new policy for the secure use of social media. The policy officially recognizes that "Internet capabilities are integral ...
- February 25, 2010
FEMA's voluntary PS-Prep will designate comprehensive standards to certify business continuity plans, but will certification change the future of BC planning?
- February 25, 2010
A hearing in the House of Representatives on online privacy and location-based services suggests that geolocation data might be treated as personally identifiable information.
- February 24, 2010
The Automated Audit, Assertion, Assessment, and Assurance API (A6) working group is newly organized under the brand of CloudAudit. The stated goal of CloudAudit is to “provide a common interface ...
- February 19, 2010
Is there a groundswell in business for using continuous controls monitoring to beef up corporate governance risk and compliance programs? Analysts and vendors have certainly launched a full-out ...