- December 05, 2014
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.
- November 25, 2014
As U.S. federal agencies put tech giants' data security practices under the microscope, consumer privacy issues are on everybody's minds. Also in privacy news: Two U.S. business alliances are ...
- November 13, 2014
As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.
- November 03, 2014
Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.
- October 30, 2014
Apple Pay rolled out to much fanfare earlier this week, but may have bypassed some compliance requirements that Apple's mobile payment rivals have to maintain. In other recent headlines, the FCC ...
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- October 29, 2014
In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.
- October 17, 2014
Online consumer security and privacy remains in the headlines as big-name companies continue to report cybersecurity breaches. Further investigations into the JPMorgan Chase cyberhack revealed that ...
- October 08, 2014
The prevalence of BYOD and cloud means corporate data is exposed to a wider risk landscape than ever before, security experts say. Learn how to make sure your mobile privacy and security policies can withstand modern threats.
- October 02, 2014
As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.
- September 30, 2014
Facebook has unveiled a new ad platform that promises marketers deeper insight into the data of billions of its users -- a move that has raises big concerns among privacy advocates. Also in data ...
- September 26, 2014
Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.
- September 19, 2014
Five former Home Depot employees claim the company lacked adequate customer data protection tools and that executives discouraged security system improvements that could have helped prevent the ...
- September 12, 2014
Participants in the latest #GRCchat discuss how to overcome the legal discovery challenges presented by vendor management and social media data.
- September 04, 2014
Data privacy riddled tech headlines this week as Apple was forced to defend iCloud's security when hackers leaked celebrities' intimate photos. The tech giant also announced changes to its privacy ...
- September 03, 2014
Big data creates many e-discovery challenges, but participants in the August #GRCchat said a comprehensive information governance policy can help.