- January 29, 2015
In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.
- January 20, 2015
Hackers may have found a way to commercialize their services as individuals begin to seek "hackers for hire" to carry out low-profile cyberintrusions. In other recent governance, risk and ...
- January 20, 2015
There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.
- January 19, 2015
This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.
- January 13, 2015
Can we leave the "year of the breach" title to 2014? In this #GRCChat recap, participants shared their enterprise GRC and security predictions for 2015.
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by IBM - B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
Sponsored by IBM - This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More
- January 07, 2015
Business cybersecurity -- or the lack thereof -- continued to make headlines in the past few weeks as more U.S. private-sector firms consider counteroffensive tactics against attackers. Also in ...
- January 07, 2015
A new year means a fresh start. In this #GRCChat recap, participants assess their current IT challenges and share their GRC 2015 resolutions.
- January 06, 2015
Information security is moving up the priority list at many organizations. In this #GRCChat recap, participants look back at 2014 to discuss their top IT GRC regrets.
- December 29, 2014
In our "Top 10 of 2014," find the most popular SearchCompliance articles from the past year offering advice on deploying a cutting-edge GRC strategy.
- December 23, 2014
President Barack Obama declared that the U.S. government will respond to North Korea's actions after the FBI announced that the nation-state was behind last month's calamitous cyberattack against ...
- December 19, 2014
Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.
- December 17, 2014
Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.
- December 11, 2014
Sony is the latest big-name company to have its computer network hacked. Corporate information and entire films were leaked online in what some suspect is retaliation by the North Korean ...
- December 10, 2014
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
- December 05, 2014
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.