Vulnerability assessment for compliance
- November 21, 2012
With consumer-targeted devices increasingly used for business purposes, mobile computing security continues to be a huge risk management concern.
- September 13, 2012
The White House is reportedly considering a cybersecurity executive order to push digital defense development for critical infrastructure protection.
- July 26, 2012
Despite an IT consumerization influx, some organizations leave something to be desired when it comes to mobile device security, our survey found.
- May 07, 2012
Technology law expert Jeffrey Ritter discusses the obstacles to governing social media security in 21st century business and what companies can do to protect their information.
- February 09, 2012
With the number and severity of breaches increasing, data protection strategies are vital. To help, the Online Trust Alliance has released a guide to online data protection.
- January 27, 2012
Detractors of SOPA and other antipiracy legislation say new regulations are needed -- but they must be better targeted. To do so, they say regulators simply need to follow the money.
- January 16, 2012
The SEC has released new "risk alerts" that outline how financial firms can use social media guidelines to protect their business from fraud and comply with federal regulations.
- January 03, 2012
After the holidays, many companies are facing an influx of mobile devices that could affect compliance with various regulations. Is your mobile device security strategy ready?
- November 23, 2011
In 2011, mobile malware and targeted attacks against big-name companies were among the top online security threats. Here’s why you need to prepare for more of the same in 2012.
- May 06, 2011
After a cyberattack put Sony's protection of personal information under a microscope, the company has announced increased security measures and enhanced customer data protection.
- April 08, 2011
The Epsilon data breach may have exposed thousands of customer email addresses to cybercriminals, highlighting the lack of corporate email security to protect consumers.
- October 25, 2010
With corporate scandals elevating the importance of chief audit executives, now is the time for CAEs to strategically partner with the C-suite, says Deloitte veteran Shayne Gregg.
- September 07, 2010
New products are designed to enforce data security surrounding cloud computing infrastructures, and to assist law firms with risk management. Find out how they can help.
- March 16, 2010
As more legislation on P2P file-sharing security risks makes its way into the Senate, the FTC offers guidance to protect against data breaches.
- February 25, 2010
A hearing in the House of Representatives on online privacy and location-based services suggests that geolocation data might be treated as personally identifiable information.