New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Risk management and compliance News
January 31, 2018
There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...
December 15, 2017
Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...
November 30, 2017
Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...
November 16, 2017
Efforts to establish public and private sector cybersecurity cooperation have stalled in recent years, but high-profile incidents could be turning the tide.
Risk management and compliance Get Started
Bring yourself up to speed with our introductory content
A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. Continue Reading
An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria. Continue Reading
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data. Continue Reading
Evaluate Risk management and compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cybersecurity professionals' increased workloads leave little time for training, leaving their skill sets -- and their companies' data security -- vulnerable to outside threats. Continue Reading
Cybersecurity incidents continued to plague companies in 2017. Here's a rundown of the five with the most impact, and lessons learned from each. Continue Reading
Reassessing the CISO-CIO reporting structure could prove to be a vital step in boosting an organization's data protection strategy, according to cybersecurity expert Tarah Wheeler. Continue Reading
Manage Risk management and compliance
Learn to apply best practices and optimize your operations.
As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at Balabit, discusses how to prep for Article 33 of GDPR. Continue Reading
Insider threat prevention has become inherent to cybersecurity strategy, but companies must use the right metrics to determine whether their efforts are working. Continue Reading
Performance might not suffer too much when using a virtual patch, but there are reliability, quality and support concerns associated with this technology. Continue Reading
Problem Solve Risk management and compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Regulatory agencies offer broad guidance for compliance management system development, but companies may be best served by referring to widely accepted risk management principles. Continue Reading
Interactive gamification techniques provide a fun, practical way to train employees and help them improve cybersecurity skills, says Cybrary COO Kathie Miley. Continue Reading
Data breach litigation can be highly detrimental to an organization that just suffered a major security incident. Find out what kinds of legal action enterprises could face in the event of a data breach. Continue Reading