• November 21, 2018 21 Nov'18

    Risk assessments essential to secure third-party vendor management

    Panelists at Infosec North America advised those charged with third-party vendor management to perform due diligence and assess the innate risk vendors create for business processes.

  • July 27, 2018 27 Jul'18

    Cybersecurity and physical security: Key for 'smart' venues

    With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues.

  • March 30, 2018 30 Mar'18

    FAQ: How is digitization influencing SEC compliance priorities?

    As online trading and digital finance becomes the norm, updated SEC compliance regulations target these transactions in an effort to improve digital asset security.

  • February 09, 2018 09 Feb'18

    Being Cyber Essentials certified will help prep for GDPR

    With enforcement of the EU General Data Protection Regulation (GDPR) in the offing, organizations are busy preparing for a new era in privacy regulation. But UK companies that are Cyber Essentials ...

  • January 31, 2018 31 Jan'18

    Alphabet unveils Chronicle cybersecurity business unit

    There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...

  • Sponsored News

    • 5 ways to accelerate time-to-value with data

      Organizations that embrace IT Transformation are 18x more likely to make faster, data-driven decisions—while also being more innovative, competitive and cost-efficient. With fast, automated access to real-world data from current workloads, you can expedite development cycles, eliminate silos and accelerate access to innovation. Here’s how. See More

    • 4 steps to making better-informed IT investments

      IT teams are under the gun to make data-based, future-oriented infrastructure investments to support IT transformation and cloud computing. Here’s how your organization can easily and efficiently collect, visualize, model and share real-world data from existing workloads to make faster and smarter decisions. See More

    • Modernize business-critical workloads with intelligence

      Modernizing your application portfolio demands that you analyze each app to identify cost savings and gaps in features and functions that could have a negative impact on your competitive posture or operational efficiencies. To do this most efficiently, you need actionable data about how applications and workloads are performing in your environment. See More

    • Choose the right cloud platform for each workload

      Multi-cloud has become a fact of life in today’s era. More than 90% of organizations use public cloud, and more than 80% have multi-cloud environments. On average, organizations use 4.8 clouds, with enterprises running 32% of workloads in public cloud and 45% in private cloud. See More

    View All Sponsored News
  • December 15, 2017 15 Dec'17

    Cybersecurity professionals struggle to make their job a priority

    Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...

  • November 30, 2017 30 Nov'17

    Cybersecurity insurance only a piece of data protection strategy

    Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...

  • November 14, 2017 14 Nov'17

    Government, business cybersecurity cooperation still faces roadblocks

    Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must ...

  • October 23, 2017 23 Oct'17

    Cybersecurity talent shortage: Is recruiting from IT the golden ticket?

    At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent shortage.

  • September 19, 2017 19 Sep'17

    Drone industry finds ally, watchdog in the FAA

    As the use of drones continues to expand, regulators are trying to make sure rules governing the burgeoning drone industry ensure safety, but don't hinder innovation.

  • June 22, 2017 22 Jun'17

    IT Priorities 2017 survey: Compliance initiatives in full throttle

    Regulatory compliance initiatives remain at the top of GRC professionals' lists of priorities this year, according to TechTarget's annual IT Priorities survey.

  • March 31, 2017 31 Mar'17

    Risk mapping key to security, business integration

    InfoSec should start talking to the business in the language of security risk,Tom Kartanowicz, head of information security at Natixis, North America, told the audience at the recent CDM Media CISO ...

  • December 19, 2016 19 Dec'16

    GRC news roundup: Russian hacking allegations persist

    After the U.S. was allegedly plagued by Russian cyberattacks during the election, members of both the Democratic and Republican parties are now calling for investigations. Also in recent GRC news: ...

  • December 01, 2016 01 Dec'16

    Trump presidency raises questions for regulatory compliance

    The future of regulatory compliance is under scrutiny as President-elect Donald Trump's administration continues the transition process. Also in recent GRC news: Hackers demanded ransom after ...

  • November 30, 2016 30 Nov'16

    Flexibility, speed needed for corporate data protection

    In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...