- January 20, 2012
It was an eventful week for Internet-related antipiracy legislation, to say the least. After threatening for weeks, Internet giants such as Wikipedia and Google participated in a day-long ...
- January 16, 2012
The SEC has released new "risk alerts" that outline how financial firms can use social media guidelines to protect their business from fraud and comply with federal regulations.
- January 13, 2012
Just last April, Google Inc. settled Federal Trade Commission (FTC) charges that it used "deceptive tactics and violated its own privacy promises" to consumers when it launched Google Buzz in 2010. ...
- January 06, 2012
Internet giants -- including eBay, Google, Facebook and Twitter -- reportedly are considering a simultaneous "blackout" of their sites in protest of the Stop Online Piracy Act. Now they are ...
- January 03, 2012
After the holidays, many companies are facing an influx of mobile devices that could affect compliance with various regulations. Is your mobile device security strategy ready?
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- December 15, 2011
Although many companies see the benefits of a solid cloud computing strategy, our survey found that security and compliance often fall by the wayside when businesses move to the cloud.
- December 14, 2011
As Carrier IQ defends its data collection processes, some experts say the fact that the information being collected exists at all is a potential privacy and compliance violation.
- December 12, 2011
As mandatory eXtensible Business Reporting Language use becomes the norm in business communications, one expert says XBRL tagging can assist risk management and analysis.
- December 08, 2011
With Chris Dodd already in Hollywood, Sen. Barney Frank's retirement announcement last month led some to speculate the push for Dodd-Frank Act regulations would retire with him. The controversial ...
- December 06, 2011
When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. ...
- December 01, 2011
- November 29, 2011
Federal governments all over the world have become increasingly hands-on with cybersecurity strategy and online privacy, but businesses have sometimes been critical of new rules that they say will ...
- November 23, 2011
In 2011, mobile malware and targeted attacks against big-name companies were among the top online security threats. Here’s why you need to prepare for more of the same in 2012.
- November 21, 2011
Information risk management impacts each and every one of us both professionally and personally. Yet we still can’t seem to properly grasp managing information risk and put it into action. The ...
- November 17, 2011
It was the shot heard round the social media world: This week, a Facebook spam attack resulted in pornographic and violent images showing up on users’ news feeds. Facebook has always prided itself ...