Risk management and compliance
- July 27, 2018
With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues.
- January 31, 2018
There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...
- December 15, 2017
Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...
- November 30, 2017
Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...
- November 14, 2017
Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must ...
- October 23, 2017
At the 2017 ISSA International Conference, experts urged companies to recruit from existing IT staff to confront the looming cybersecurity talent shortage.
- March 31, 2017
InfoSec should start talking to the business in the language of security risk,Tom Kartanowicz, head of information security at Natixis, North America, told the audience at the recent CDM Media CISO ...
- November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
- November 22, 2016
The massive DDoS attack on Oct. 21 was a harbinger of bad news, according to cybersecurity expert Bryce Austin. It is a prime example that the IoT makes cybercriminals increasingly capable of ...
- October 06, 2016
Snap, Inc., the company behind the popular photo and video messaging app Snapchat, is releasing a pair of photo and video-capturing glasses that have some worried about the possible privacy ...
- September 21, 2016
When Anndorie Cromar received a call from Child Protective Services that they were coming to take her children away, she was flabbergasted. She was unaware that her medical identity was stolen and ...
- September 20, 2016
Wells Fargo has been fined $185 million and fired more than 5000 employees after the discovery of an illegal sales push that duped customers for years. Also in recent GRC news, U.S. businesses with ...
- August 15, 2016
Investors are nervous about bitcoin's future value after Bitfinex, one of the world's "big four" bitcoin exchanges, was hacked and had nearly $65 million worth of bitcoins stolen. Also in recent ...
- July 15, 2016
Digitization requires big changes to companies' strategic processes, and security is no different: In a recent report, Gartner predicts that 60% of digital businesses will experience major service ...
- July 13, 2016
New Jersey's new chief technology officer has announced plans to boost data security by ramping up compliance monitoring in the state. In other GRC news, the Consumer Financial Protection Bureau ...
- May 31, 2016
The time isn’t far away when everything in our lives, from furniture to coffee pots, will have the ability to be "smart." Various reports estimate that there will be anywhere between 30 to 200 ...
- March 31, 2016
Some 1,500 cybersecurity professionals gathered at this week's SecureWorld Boston conference that featured discussions with leading industry experts about today's best cybersecurity practices. The ...
- March 08, 2016
When General Data Protection Regulation -- a new EU-wide data protection framework that will replace Safe Harbor -- was introduced by European Union on December 2015, global companies such as Adobe ...
- February 19, 2016
This week, Apple chief Tim Cook said in a letter to the company's customers that it won't give in to the FBI's demand to create an iPhone backdoor. Plus, the number of resolved FCPA enforcement ...
- February 16, 2016
Just as companies were getting a handle on mobility, the Internet of Things (IoT) business is officially booming: Gartner Inc. predicts there will be 6.4 billion connected "things" used worldwide in 2016. Connected consumer devices get most of the ...
- December 29, 2015
We've rounded up the top 10 governance, risk and compliance stories of the year, with timely advice about GRC strategy, 2015 compliance challenges and best practices for overcoming data security issues.
- December 03, 2015
New laws encourage cybersecurity information sharing between the public and private sector, but will the data protection measures infringe on privacy?
- December 02, 2015
As organizations' data threats and regulatory demands increase, GRC professionals are seeing their IT compliance management skill sets become highly prized across industries.
- November 06, 2015
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
- July 06, 2015
#GRCChat participants discuss how cybersecurity legislation could hurt data privacy and what personal information protections should be included in the new rules.
- June 29, 2015
The MIT Sloan School of Management has launched a consortium that touts interdisciplinary research and cooperation as keys to improving cybersecurity.
- May 14, 2015
In this #GRCChat, participants discuss the causes behind information security breaches and how enterprises can protect against them to improve IT security practices.
- May 12, 2015
In this #GRCChat, participants discuss how changes in technology like consumerization and evolving security threats affect GRC management and consider who should be responsible for that management.
- April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
- March 20, 2015
What GRC management best practices can keep business data compliant while reducing consumer risk? Discuss with us during #GRCChat March 26 at 12 p.m. EST.
- January 29, 2015
In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.
- January 20, 2015
There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.
- January 13, 2015
Can we leave the "year of the breach" title to 2014? In this #GRCChat recap, participants shared their enterprise GRC and security predictions for 2015.
- January 06, 2015
Information security is moving up the priority list at many organizations. In this #GRCChat recap, participants look back at 2014 to discuss their top IT GRC regrets.
- December 29, 2014
In our "Top 10 of 2014," find the most popular SearchCompliance articles from the past year offering advice on deploying a cutting-edge GRC strategy.
- December 20, 2013
As businesses expand their IT security and compliance focus, GRC professionals are seeing salary increases with their broadened responsibilities.
- May 14, 2012
The GRC technology market has become increasingly targeted but companies' buying decisions have not followed suit. How can you make sure you're getting the most bang for your buck?
- April 23, 2012
ISACA’s update to its popular COBIT 5 framework incorporates a business-wide approach the organization says helps enterprises maximize their information and technology assets.
- February 09, 2012
With the number and severity of breaches increasing, data protection strategies are vital. To help, the Online Trust Alliance has released a guide to online data protection.
- September 26, 2011
The regulatory landscape's evolution requires close attention to risk management and compliance processes. But GRC also makes good business sense, and can improve your bottom line.
- July 05, 2011
Companies need an effective way to mitigate the risks of increasingly ubiquitous social media. But establishing a solid corporate social media policy is no easy task.
- December 18, 2009
FISMA compliance is on the horizon for cloud computing vendors catering to the federal government. New security metrics from OMB aren't hazy on potential requirements, either.
- December 16, 2009
ISACA has released a risk management framework to help enterprise compliance officers identify, govern and manage IT risk. The Risk IT framework is aligned with COBIT.
- October 06, 2009
Emerging technologies that allow users to broadcast geographic locations raise many issues for companies, CIOs, while legislatures and the FTC consider legal aspects.
- July 28, 2009
Traditionally adversaries, CISOs and auditors can leverage each other's skills to move toward a risk-based approach to compliance.
- June 30, 2009
Using a risk-based approach to address regulatory mandates is all the rage in compliance circles, but it's not for beginners. Here's how it works.
- June 19, 2009
Twitter can be used for social good, business and journalism, but the potential for exploitation by cybercriminals and noncompliance with regulatory requirements is real and growing.