- July 06, 2015
#GRCChat participants discuss how cybersecurity legislation could hurt data privacy and what personal information protections should be included in the new rules.
- July 06, 2015
Honda has revamped its regulatory compliance reporting processes after information technology failures led to record fines for TREAD Act violations.
- June 29, 2015
The MIT Sloan School of Management has launched a consortium that touts interdisciplinary research and cooperation as keys to improving cybersecurity.
- June 25, 2015
The U.S. government data breach announced last week began a year ago, giving the perpetrators plenty of time to access federal employees' personal information, according to the NSA. Also in recent ...
- June 12, 2015
(This blog post was written by Aislyn Fredsall, an editorial assistant for the TechTarget CIO media group through Northeastern University's co-op program.) Is security no longer a major concern for ...
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- June 11, 2015
U.S. officials say the recent hack of government computer systems affects 4 million current and former federal employees, but the breach could have impacted private citizens, too. Also in the news: ...
- June 05, 2015
(This blog post was written by Jeff Whited, senior manager of education development at ARMA International.) By leveraging big data as an asset, organizations are tapping new business efficiencies ...
- May 28, 2015
If recent headlines are any indication, Wall Street banks and other financial institutions continue to garner poor marks when it comes to regulatory compliance: Earlier this month, several major ...
- May 14, 2015
In this #GRCChat, participants discuss the causes behind information security breaches and how enterprises can protect against them to improve IT security practices.
- May 12, 2015
In this #GRCChat, participants discuss how changes in technology like consumerization and evolving security threats affect GRC management and consider who should be responsible for that management.
- May 06, 2015
The Securities and Exchange Commission (SEC) is pushing to provide U.S. shareholders with better metrics to compare executive pay against company performance. In other GRC headlines from recent ...
- April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
- April 28, 2015
Companies operating in the digital age generate more data than ever before. Storage costs also remain relatively cheap, so many businesses keep data "just in case" it is needed for business purposes or to settle a compliance issue. With so much data...
- April 22, 2015
Much to the chagrin of privacy advocates, U.S. legislators have been pushing to pass a bill to improve cyberthreat intelligence sharing before discussing National Security Agency (NSA) surveillance ...
- April 08, 2015
Following the recent streak of high-profile cyberattacks on U.S. companies, the Obama administration last week unveiled a program that would impose sanctions on individuals or groups overseas that ...