- December 29, 2014
In our "Top 10 of 2014," find the most popular SearchCompliance articles from the past year offering advice on deploying a cutting-edge GRC strategy.
- December 23, 2014
President Barack Obama declared that the U.S. government will respond to North Korea's actions after the FBI announced that the nation-state was behind last month's calamitous cyberattack against ...
- December 19, 2014
Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.
- December 17, 2014
Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.
- December 11, 2014
Sony is the latest big-name company to have its computer network hacked. Corporate information and entire films were leaked online in what some suspect is retaliation by the North Korean ...
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- December 10, 2014
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
- December 05, 2014
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.
- November 25, 2014
As U.S. federal agencies put tech giants' data security practices under the microscope, consumer privacy issues are on everybody's minds. Also in privacy news: Two U.S. business alliances are ...
- November 13, 2014
As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.
- November 03, 2014
Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.
- October 30, 2014
Apple Pay rolled out to much fanfare earlier this week, but may have bypassed some compliance requirements that Apple's mobile payment rivals have to maintain. In other recent headlines, the FCC ...
- October 29, 2014
In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.
- October 17, 2014
Online consumer security and privacy remains in the headlines as big-name companies continue to report cybersecurity breaches. Further investigations into the JPMorgan Chase cyberhack revealed that ...
- October 08, 2014
The prevalence of BYOD and cloud means corporate data is exposed to a wider risk landscape than ever before, security experts say. Learn how to make sure your mobile privacy and security policies can withstand modern threats.
- October 02, 2014
As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.