- May 06, 2015
The Securities and Exchange Commission (SEC) is pushing to provide U.S. shareholders with better metrics to compare executive pay against company performance. In other GRC headlines from recent ...
- April 30, 2015
Information sharing plays a big role in proposed cybersecurity legislation, but will the new measures hurt data privacy? Discuss with us during #GRChat May 7 at 12 p.m. EST.
- April 28, 2015
Companies operating in the digital age generate more data than ever before. Storage costs also remain relatively cheap, so many businesses keep data "just in case" it is needed for business purposes or to settle a compliance issue. With so much data...
- April 22, 2015
Much to the chagrin of privacy advocates, U.S. legislators have been pushing to pass a bill to improve cyberthreat intelligence sharing before discussing National Security Agency (NSA) surveillance ...
- April 08, 2015
Following the recent streak of high-profile cyberattacks on U.S. companies, the Obama administration last week unveiled a program that would impose sanctions on individuals or groups overseas that ...
Sponsored by DellEMC - Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More
Sponsored by DellEMC - Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More
Sponsored by DellEMC - Every organization in every industry is creating massive volumes of data. The goal of many IT modernization efforts is to ensure that the organization can harness the value of that data to understand powerful insights, increase efficiencies and drive innovations. See More
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
- March 26, 2015
The FBI's quest to expand its hacking authority moved forward last week: A judicial advisory panel approved a rule change regarding how flexible judges can be in granting search warrants outside ...
- March 20, 2015
What GRC management best practices can keep business data compliant while reducing consumer risk? Discuss with us during #GRCChat March 26 at 12 p.m. EST.
- March 17, 2015
Regulation SCI marks a new era for SEC oversight of companies' IT compliance processes, and information governance expert Jeffrey Ritter discusses how in this Q&A.
- March 17, 2015
The FCC gave new net neutrality regulations the go-ahead, but the battle for an open Internet is hardly over. In this #GRCChat recap, find out whether the new regulations mean good news for innovation and consumer privacy.
- March 11, 2015
Data breaches have been intensifying in recent years, but security expert Benjamin Dean argues that many companies still lack motivation to invest in more robust information security. Also in ...
- February 26, 2015
AT&T's has begun rollout of a fiber-optic Internet service that furnishes customers with high-speed access, but they must pay an extra monthly charge if they want to keep their browsing habits ...
- February 11, 2015
In a bold effort to ensure net neutrality, FCC Chairman Tom Wheeler has proposed a new set of rules that would treat the Internet as a public utility and prohibit pay-to-play fast lanes. Also in ...
- February 05, 2015
Have you considered the GRC implications of wearables in the workplace? In this #GRCChat recap, participants consider the impact of wearables on established policies and how businesses can ensure data security and privacy.
- January 29, 2015
In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.
- January 20, 2015
Hackers may have found a way to commercialize their services as individuals begin to seek "hackers for hire" to carry out low-profile cyberintrusions. In other recent governance, risk and ...