News
Vulnerability assessment for compliance
- December 17, 2014
17 Dec'14
The future of active cyberdefense
Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.
- December 10, 2014
10 Dec'14
Offensive security in the enterprise: Examples, advice and cautions
In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.
- December 05, 2014
05 Dec'14
Hacking back blurs line between active cyberdefense and cybercrime
With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.
-
- November 03, 2014
03 Nov'14
How to build on PCI DSS regulations and confront mobile payment apps
Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.
- September 26, 2014
26 Sep'14
Enterprise mobile security: Clear and thorough data usage rules key
Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.
- June 19, 2014
19 Jun'14
SEC cybersecurity initiative puts spotlight on data strategy
A new SEC initiative examines cybersecurity processes in markets the agency regulates, but it could impact every company's data management strategy.
- May 30, 2014
30 May'14
CSO: System logging a vital computer security tool
Tenable Network Security CSO Marcus Ranum reveals that data-driven intelligence is not as critical as system logging to security strategy.
- May 20, 2014
20 May'14
Twitter chat: Develop a risk profile for better breach prevention
In this #GRCchat recap, a former Federal Communications Commission CIO discusses how a quantitative risk profile can mitigate financial risk.
- February 04, 2014
04 Feb'14
What is mobile data GRC? Join our mobile data security discussion
What is mobile data, which devices produce it, and how can you protect it? Join SearchCompliance Feb. 20 to discuss mobile governance and compliance.
- December 13, 2013
13 Dec'13
New vulnerability assessment tools proactively detect security threats
Vulnerability assessment tools can help enterprises detect and eliminate security threats early on. Here are some of the newer products on the market.
-
- December 06, 2013
06 Dec'13
Predictive security intelligence: How it protects today's enterprise
In this Ask the Expert video, security guru Eric Cowperthwaite explains predictive security intelligence and how to leverage it in the enterprise.
- September 26, 2013
26 Sep'13
ISSA International Conference to spotlight latest cybersecurity trends
Organizers of next month's ISSA International Conference discuss what attendees can expect from the event and the current cybersecurity strategy landscape.
- August 29, 2013
29 Aug'13
#Compliance: NSA data gathering continues to inflame controversy
The online debate surrounding the NSA's data-gathering activities persists, as revelations surrounding the PRISM program continue to come to light.
- August 15, 2013
15 Aug'13
#Compliance: Online risk, cybersecurity make waves in gov't, industry
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.
- August 08, 2013
08 Aug'13
Product Spotlight: New and improved risk management assessment tools
In this Product Spotlight, we look at two new risk management assessment tools intended to better secure and protect your organization's private data.