- April 28, 2015
Companies operating in the digital age generate more data than ever before. Storage costs also remain relatively cheap, so many businesses keep data "just in case" it is needed for business purposes or to settle a compliance issue. With so much data...
- April 22, 2015
Much to the chagrin of privacy advocates, U.S. legislators have been pushing to pass a bill to improve cyberthreat intelligence sharing before discussing National Security Agency (NSA) surveillance ...
- April 08, 2015
Following the recent streak of high-profile cyberattacks on U.S. companies, the Obama administration last week unveiled a program that would impose sanctions on individuals or groups overseas that ...
- March 26, 2015
The FBI's quest to expand its hacking authority moved forward last week: A judicial advisory panel approved a rule change regarding how flexible judges can be in granting search warrants outside ...
- March 20, 2015
What GRC management best practices can keep business data compliant while reducing consumer risk? Discuss with us during #GRCChat March 26 at 12 p.m. EST.
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
Sponsored by DellEMC - Organizations that embrace IT Transformation are 18x more likely to make faster, data-driven decisions—while also being more innovative, competitive and cost-efficient. With fast, automated access to real-world data from current workloads, you can expedite development cycles, eliminate silos and accelerate access to innovation. Here’s how. See More
Sponsored by DellEMC - IT teams are under the gun to make data-based, future-oriented infrastructure investments to support IT transformation and cloud computing. Here’s how your organization can easily and efficiently collect, visualize, model and share real-world data from existing workloads to make faster and smarter decisions. See More
Sponsored by DellEMC - Modernizing your application portfolio demands that you analyze each app to identify cost savings and gaps in features and functions that could have a negative impact on your competitive posture or operational efficiencies. To do this most efficiently, you need actionable data about how applications and workloads are performing in your environment. See More
- March 17, 2015
Regulation SCI marks a new era for SEC oversight of companies' IT compliance processes, and information governance expert Jeffrey Ritter discusses how in this Q&A.
- March 17, 2015
The FCC gave new net neutrality regulations the go-ahead, but the battle for an open Internet is hardly over. In this #GRCChat recap, find out whether the new regulations mean good news for innovation and consumer privacy.
- March 11, 2015
Data breaches have been intensifying in recent years, but security expert Benjamin Dean argues that many companies still lack motivation to invest in more robust information security. Also in ...
- February 26, 2015
AT&T's has begun rollout of a fiber-optic Internet service that furnishes customers with high-speed access, but they must pay an extra monthly charge if they want to keep their browsing habits ...
- February 11, 2015
In a bold effort to ensure net neutrality, FCC Chairman Tom Wheeler has proposed a new set of rules that would treat the Internet as a public utility and prohibit pay-to-play fast lanes. Also in ...
- February 05, 2015
Have you considered the GRC implications of wearables in the workplace? In this #GRCChat recap, participants consider the impact of wearables on established policies and how businesses can ensure data security and privacy.
- January 29, 2015
In this #GRCChat, find out what GRC features to keep top of mind when designing a BYOD security policy -- and how to ensure employees are on board.
- January 20, 2015
Hackers may have found a way to commercialize their services as individuals begin to seek "hackers for hire" to carry out low-profile cyberintrusions. In other recent governance, risk and ...
- January 20, 2015
There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.
- January 19, 2015
This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.