Looking for something else?
Risk management and compliance News
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
November 22, 2016
The massive DDoS attack on Oct. 21 was a harbinger of bad news, according to cybersecurity expert Bryce Austin. It is a prime example that the IoT makes cybercriminals increasingly capable of ...
October 06, 2016
Snap, Inc., the company behind the popular photo and video messaging app Snapchat, is releasing a pair of photo and video-capturing glasses that have some worried about the possible privacy ...
September 21, 2016
When Anndorie Cromar received a call from Child Protective Services that they were coming to take her children away, she was flabbergasted. She was unaware that her medical identity was stolen and ...
Risk management and compliance Get Started
Bring yourself up to speed with our introductory content
The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings. Continue Reading
The proliferation of IoT devices has resulted in an upsurge in data-driven marketing, which in turn can fuel data security, privacy and ethics concerns, experts say. Continue Reading
Risk management is a company's process for identifying and controlling threats to its assets, including proprietary corporate data, customers' PII and intellectual property. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Risk management and compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When used too early in the hiring process, video can lead to discrimination based on race, age or sex, but it can have positive benefits with the right guidelines in place. Continue Reading
A consortium of financial services associations is calling for international cybersecurity standards to help avoid conflicting compliance mandates across global markets. Continue Reading
The decentralized nature of public blockchain has raised concerns about digital identity and blockchain privacy. A panel of experts addresses these questions. Continue Reading
Manage Risk management and compliance
Learn to apply best practices and optimize your operations.
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading
In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices. Continue Reading
In this webcast, CISO Demetrios Lazarikos discusses IoT's significance in the evolution of technology and its influence in consumers' everyday lives. Continue Reading
Problem Solve Risk management and compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ransomware mitigation strategies should be a top business priority as the malware becomes increasingly common. But sometimes, paying up might be the only option. Continue Reading
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading
Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach. Continue Reading