- June 25, 2015
The U.S. government data breach announced last week began a year ago, giving the perpetrators plenty of time to access federal employees' personal information, according to the NSA. Also in recent ...
- June 12, 2015
(This blog post was written by Aislyn Fredsall, an editorial assistant for the TechTarget CIO media group through Northeastern University's co-op program.) Is security no longer a major concern for ...
- June 11, 2015
U.S. officials say the recent hack of government computer systems affects 4 million current and former federal employees, but the breach could have impacted private citizens, too. Also in the news: ...
- June 05, 2015
(This blog post was written by Jeff Whited, senior manager of education development at ARMA International.) By leveraging big data as an asset, organizations are tapping new business efficiencies ...
- May 28, 2015
If recent headlines are any indication, Wall Street banks and other financial institutions continue to garner poor marks when it comes to regulatory compliance: Earlier this month, several major ...
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- May 14, 2015
In this #GRCChat, participants discuss the causes behind information security breaches and how enterprises can protect against them to improve IT security practices.
- May 12, 2015
In this #GRCChat, participants discuss how changes in technology like consumerization and evolving security threats affect GRC management and consider who should be responsible for that management.
- May 06, 2015
The Securities and Exchange Commission (SEC) is pushing to provide U.S. shareholders with better metrics to compare executive pay against company performance. In other GRC headlines from recent ...
- April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
- April 28, 2015
Companies operating in the digital age generate more data than ever before. Storage costs also remain relatively cheap, so many businesses keep data "just in case" it is needed for business purposes or to settle a compliance issue. With so much data...
- April 22, 2015
Much to the chagrin of privacy advocates, U.S. legislators have been pushing to pass a bill to improve cyberthreat intelligence sharing before discussing National Security Agency (NSA) surveillance ...
- April 08, 2015
Following the recent streak of high-profile cyberattacks on U.S. companies, the Obama administration last week unveiled a program that would impose sanctions on individuals or groups overseas that ...
- March 26, 2015
The FBI's quest to expand its hacking authority moved forward last week: A judicial advisory panel approved a rule change regarding how flexible judges can be in granting search warrants outside ...
- March 20, 2015
What GRC management best practices can keep business data compliant while reducing consumer risk? Discuss with us during #GRCChat March 26 at 12 p.m. EST.
- March 17, 2015
Regulation SCI marks a new era for SEC oversight of companies' IT compliance processes, and information governance expert Jeffrey Ritter discusses how in this Q&A.