- July 27, 2018
With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues.
- March 30, 2018
As online trading and digital finance becomes the norm, updated SEC compliance regulations target these transactions in an effort to improve digital asset security.
- February 09, 2018
With enforcement of the EU General Data Protection Regulation (GDPR) in the offing, organizations are busy preparing for a new era in privacy regulation. But UK companies that are Cyber Essentials ...
- January 31, 2018
There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...
- December 15, 2017
Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- November 30, 2017
Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...
- November 14, 2017
Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must ...
- October 23, 2017
At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent shortage.
- September 19, 2017
As the use of drones continues to expand, regulators are trying to make sure rules governing the burgeoning drone industry ensure safety, but don't hinder innovation.
- June 22, 2017
Regulatory compliance initiatives remain at the top of GRC professionals' lists of priorities this year, according to TechTarget's annual IT Priorities survey.
- March 31, 2017
InfoSec should start talking to the business in the language of security risk,Tom Kartanowicz, head of information security at Natixis, North America, told the audience at the recent CDM Media CISO ...
- December 19, 2016
After the U.S. was allegedly plagued by Russian cyberattacks during the election, members of both the Democratic and Republican parties are now calling for investigations. Also in recent GRC news: ...
- December 01, 2016
The future of regulatory compliance is under scrutiny as President-elect Donald Trump's administration continues the transition process. Also in recent GRC news: Hackers demanded ransom after ...
- November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
- November 22, 2016
The massive DDoS attack on Oct. 21 was a harbinger of bad news, according to cybersecurity expert Bryce Austin. It is a prime example that the IoT makes cybercriminals increasingly capable of ...