- April 16, 2010
I’ll start with the possibly infuriating hypothesis: There’s money to be made from governance, risk and compliance (GRC) software by vendors, of course, but also for enterprise IT shops. And it is ...
- April 05, 2010
Interest in cyberinsurance is rising in the wake of data breach notification laws and as more is learned about the potential cost of a data breach. The question is: Do you need it?
- March 31, 2010
A powerful collection of organizations has formed a new coalition to push for an update to the Electronic Communications Privacy Act (ECPA). Members of the coalition include Google, Microsoft, ...
- March 29, 2010
A new act introduced in the U.S. House of Representatives proposes reforming FISMA compliance to better address risks posed by cybersecurity threats and cloud computing.
- March 26, 2010
The cloudiness of cloud computing security is already getting to be an old joke -- certainly, an overused headline. But it was no joke this week listening to the head of IT security at Boston ...
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- March 26, 2010
In a public seminar held earlier this week on eXtensible Business Reporting Language (XBRL) compliance, the Securities and Exchange Commission (SEC) offered further guidance on how it expects ...
- March 24, 2010
FTC experts recommend the creation of new online privacy frameworks that can keep pace with technology.
- March 23, 2010
A revision of the Cybersecurity Act removes an Internet kill-switch provision, clarifies certification and expands public-private cooperation on federal cybersecurity compliance.
- March 16, 2010
As more legislation on P2P file-sharing security risks makes its way into the Senate, the FTC offers guidance to protect against data breaches.
- March 15, 2010
Real-time compliance, social networking security, evolving cybersecurity threats and cloud computing compliance were among the top themes at RSA Conference 2010.
- March 12, 2010
An RSA Conference Advisory Board roundtable offered advice on security trends, including social networking security, online privacy risk and usercentric authentication.
- March 11, 2010
Jeremiah Grossman, the CTO of White Hat Security, has been at the forefront of documenting the dangers of Web application security. As he points out on his blog, however, state and federal ...
- March 08, 2010
If your company is finding it difficult to weigh the costs vs. benefits of a formal risk management program, Standard & Poor’s (S&P) feels your pain. I caught up with Steven Dryer, managing ...
- March 08, 2010
How should an enterprise risk management strategy affect a company's credit ratings? Standard & Poor's is still trying to figure that out. Find out why.
- March 05, 2010
The Open Identity Exchange trust framework will enable the secure authentication and exchange of online identity credentials across public and private sectors.