Managing compliance operations News
December 01, 2016
The future of regulatory compliance is under scrutiny as President-elect Donald Trump's administration continues the transition process. Also in recent GRC news: Hackers demanded ransom after ...
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
November 22, 2016
The massive DDoS attack on Oct. 21 was a harbinger of bad news, according to cybersecurity expert Bryce Austin. It is a prime example that the IoT makes cybercriminals increasingly capable of ...
October 31, 2016
Records management is more vital than ever to business success, but not enough organizations care about it, according to Rick Tucker. To prove it, Tucker, vice president of sales and marketing at ...
Managing compliance operations Get Started
Bring yourself up to speed with our introductory content
The rush to embrace digital technologies can put organizations at extreme risk. Here are six foundations for creating an information-security strategy that will keep your data safe. Continue Reading
A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American ... Continue Reading
Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Managing compliance operations Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When used too early in the hiring process, video can lead to discrimination based on race, age or sex, but it can have positive benefits with the right guidelines in place. Continue Reading
For information technology professionals, obtaining certifications have become an important way to demonstrate their knowledge, experience and qualifications. Although certification programs are ... Continue Reading
Despite numerous advancements in cloud-specific data protection technology, some companies remain in the dark about their cloud information security responsibilities. Continue Reading
Manage Managing compliance operations
Learn to apply best practices and optimize your operations.
Contractors have until the end of 2017 to meet DFARS compliance rules that put cybersecurity safeguards on what the U.S. government calls 'controlled unclassified information.' Continue Reading
Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks. Continue Reading
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading
Problem Solve Managing compliance operations Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading
Companies from a variety of industries have started exploring how blockchain governance strategies can reduce costs, speed interactions and expand business capabilities. Continue Reading