- June 06, 2014
May #GRCchat participants share top information security threats and how to prevent data breaches caused by the biggest culprits: employees.
- May 30, 2014
Tenable Network Security CSO Marcus Ranum reveals that data-driven intelligence is not as critical as system logging to security strategy.
- May 22, 2014
Four years ago, the Securities and Exchange Commission announced an initiative that offered incentives for assisting with SEC investigations and enforcement. The goal was to help investigators gain ...
- May 20, 2014
In this #GRCchat recap, a former Federal Communications Commission CIO discusses how a quantitative risk profile can mitigate financial risk.
- May 20, 2014
Data breaches lead to more than consumer dissatisfaction. #GRCChat-ters discuss why they also create financial loss and lack of customer confidence.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- April 09, 2014
Join our #GRCchat Thursday, April 17, to discuss the roles of tracking and managing vital IT assets for an information lifecycle governance strategy.
- April 08, 2014
The recent news that a former Microsoft employee was being charged by federal prosecutors for providing confidential company software code to a tech blogger raised interesting questions. While the ...
- March 21, 2014
In this video, GRC analyst Michael Rasmussen discusses why third-party management has become one of the fastest-growing segments of the GRC market.
- March 20, 2014
The SEC has ramped up regulation in recent years and 2014 will be no different. In this FAQ, learn what to expect for SEC enforcement in 2014.
- March 17, 2014
Cloud computing and compliance carry a host of GRC complications. Join our #GRCchat March 27 to hash it out with SearchCompliance staff and experts.
- February 28, 2014
(This blog post was written by Christina Torode, Editorial Director of SearchCIO Media Group) I spent a whirlwind trip to the RSA conference this week in San Francisco hanging out in the ...
- February 04, 2014
What is mobile data, which devices produce it, and how can you protect it? Join SearchCompliance Feb. 20 to discuss mobile governance and compliance.
- January 22, 2014
Who has the most responsibilities for information governance in your organization? These answers from our #GRCchat participants might surprise you.
- January 14, 2014
Professor Glenn Reynolds explains why whistleblower protection should be encouraged and why easily accessible tech is security pros' biggest nemesis.
- January 06, 2014
What information governance framework best suits your organization? Chat about GRC with us on Twitter during SearchCompliance's inaugural tweet jam.