- December 17, 2014
Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.
- December 11, 2014
Sony is the latest big-name company to have its computer network hacked. Corporate information and entire films were leaked online in what some suspect is retaliation by the North Korean ...
- December 10, 2014
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
- December 05, 2014
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.
- November 25, 2014
As U.S. federal agencies put tech giants' data security practices under the microscope, consumer privacy issues are on everybody's minds. Also in privacy news: Two U.S. business alliances are ...
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- November 13, 2014
As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.
- November 03, 2014
Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.
- October 30, 2014
Apple Pay rolled out to much fanfare earlier this week, but may have bypassed some compliance requirements that Apple's mobile payment rivals have to maintain. In other recent headlines, the FCC ...
- October 29, 2014
In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.
- October 17, 2014
Online consumer security and privacy remains in the headlines as big-name companies continue to report cybersecurity breaches. Further investigations into the JPMorgan Chase cyberhack revealed that ...
- October 08, 2014
The prevalence of BYOD and cloud means corporate data is exposed to a wider risk landscape than ever before, security experts say. Learn how to make sure your mobile privacy and security policies can withstand modern threats.
- October 02, 2014
As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.
- September 30, 2014
Facebook has unveiled a new ad platform that promises marketers deeper insight into the data of billions of its users -- a move that has raises big concerns among privacy advocates. Also in data ...
- September 26, 2014
Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.
- September 19, 2014
Five former Home Depot employees claim the company lacked adequate customer data protection tools and that executives discouraged security system improvements that could have helped prevent the ...