- January 16, 2012
The SEC has released new "risk alerts" that outline how financial firms can use social media guidelines to protect their business from fraud and comply with federal regulations.
- January 13, 2012
Just last April, Google Inc. settled Federal Trade Commission (FTC) charges that it used "deceptive tactics and violated its own privacy promises" to consumers when it launched Google Buzz in 2010. ...
- January 06, 2012
Internet giants -- including eBay, Google, Facebook and Twitter -- reportedly are considering a simultaneous "blackout" of their sites in protest of the Stop Online Piracy Act. Now they are ...
- January 03, 2012
After the holidays, many companies are facing an influx of mobile devices that could affect compliance with various regulations. Is your mobile device security strategy ready?
- December 15, 2011
Although many companies see the benefits of a solid cloud computing strategy, our survey found that security and compliance often fall by the wayside when businesses move to the cloud.
Sponsored by IBM - There’s a new mantra in endpoint management: A device is a device is a device. If you’re in IT or security, you have to treat every device the same way, no matter the format or operating system version. The answer? A UEM with cognitive capabilities. See More
Sponsored by IBM - UEM provides the appropriate levels of productivity and security functionality to support your entire environment of smartphones, tablets, laptops, desktops, wearables and IoT. Here are the top 10 things to look for in a solution. See More
Sponsored by IBM - When used in combination, UEM and AI/cognitive technologies deliver an intelligent advantage that results in cost savings, reduced complexity and productivity gains. It’s time to stop using yesterday’s technologies to address tomorrow’s challenges. See More
Sponsored by IBM - Enterprises need a tool that provides centralized visibility, control, and security for all endpoints, users, applications, content, and data. With unified endpoint management, IT can finally modernize endpoint management and security. Here’s how. See More
- December 14, 2011
As Carrier IQ defends its data collection processes, some experts say the fact that the information being collected exists at all is a potential privacy and compliance violation.
- December 12, 2011
As mandatory eXtensible Business Reporting Language use becomes the norm in business communications, one expert says XBRL tagging can assist risk management and analysis.
- December 08, 2011
With Chris Dodd already in Hollywood, Sen. Barney Frank's retirement announcement last month led some to speculate the push for Dodd-Frank Act regulations would retire with him. The controversial ...
- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- December 01, 2011
- November 29, 2011
Federal governments all over the world have become increasingly hands-on with cybersecurity strategy and online privacy, but businesses have sometimes been critical of new rules that they say will ...
- November 23, 2011
In 2011, mobile malware and targeted attacks against big-name companies were among the top online security threats. Here’s why you need to prepare for more of the same in 2012.
- November 21, 2011
Information risk management impacts each and every one of us both professionally and personally. Yet we still can’t seem to properly grasp managing information risk and put it into action. The ...
- November 17, 2011
It was the shot heard round the social media world: This week, a Facebook spam attack resulted in pornographic and violent images showing up on users’ news feeds. Facebook has always prided itself ...
- November 14, 2011
A few months ago, it was Google in regulators' crosshairs. In the past couple of weeks, however, it seems that Facebook is regulators' new focus, as they push for consumer data protection. Facebook ...