News

News

  • January 13, 2015 13 Jan'15

    Top enterprise GRC and security predictions for 2015

    Can we leave the "year of the breach" title to 2014? In this #GRCChat recap, participants shared their enterprise GRC and security predictions for 2015.

  • January 07, 2015 07 Jan'15

    More U.S. firms look to hack back after Sony data breach

    Business cybersecurity -- or the lack thereof -- continued to make headlines in the past few weeks as more U.S. private-sector firms consider counteroffensive tactics against attackers. Also in ...

  • January 07, 2015 07 Jan'15

    GRC 2015: What do you hope to achieve this year?

    A new year means a fresh start. In this #GRCChat recap, participants assess their current IT challenges and share their GRC 2015 resolutions.

  • January 06, 2015 06 Jan'15

    What were your top IT GRC regrets from 2014?

    Information security is moving up the priority list at many organizations. In this #GRCChat recap, participants look back at 2014 to discuss their top IT GRC regrets.

  • December 29, 2014 29 Dec'14

    Top 10 governance, risk and compliance strategy articles of 2014

    In our "Top 10 of 2014," find the most popular SearchCompliance articles from the past year offering advice on deploying a cutting-edge GRC strategy.

  • Sponsored News

    • 5 ways to accelerate time-to-value with data

      Organizations that embrace IT Transformation are 18x more likely to make faster, data-driven decisions—while also being more innovative, competitive and cost-efficient. With fast, automated access to real-world data from current workloads, you can expedite development cycles, eliminate silos and accelerate access to innovation. Here’s how. See More

    • 4 steps to making better-informed IT investments

      IT teams are under the gun to make data-based, future-oriented infrastructure investments to support IT transformation and cloud computing. Here’s how your organization can easily and efficiently collect, visualize, model and share real-world data from existing workloads to make faster and smarter decisions. See More

    • Modernize business-critical workloads with intelligence

      Modernizing your application portfolio demands that you analyze each app to identify cost savings and gaps in features and functions that could have a negative impact on your competitive posture or operational efficiencies. To do this most efficiently, you need actionable data about how applications and workloads are performing in your environment. See More

    • Choose the right cloud platform for each workload

      Multi-cloud has become a fact of life in today’s era. More than 90% of organizations use public cloud, and more than 80% have multi-cloud environments. On average, organizations use 4.8 clouds, with enterprises running 32% of workloads in public cloud and 45% in private cloud. See More

    View All Sponsored News
  • December 23, 2014 23 Dec'14

    Obama plans response against North Korea for Sony Pictures hack

    President Barack Obama declared that the U.S. government will respond to North Korea's actions after the FBI announced that the nation-state was behind last month's calamitous cyberattack against ...

  • December 19, 2014 19 Dec'14

    Active defense: The perils of cybervigilantism

    Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.

  • December 17, 2014 17 Dec'14

    The future of active cyberdefense

    Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

  • December 11, 2014 11 Dec'14

    North Korea applauds Sony breach but denies responsibility

    Sony is the latest big-name company to have its computer network hacked. Corporate information and entire films were leaked online in what some suspect is retaliation by the North Korean ...

  • December 10, 2014 10 Dec'14

    Offensive security in the enterprise: Examples, advice and cautions

    In IT, offensive security can involve methods other than 'hacking back.' In this #GRCChat recap, participants offer examples of active defense tactics, as well as advice on when to go on the offensive.

  • December 05, 2014 05 Dec'14

    Hacking back blurs line between active cyberdefense and cybercrime

    With breaches on the rise, some advocate the legally ambiguous approach of hacking back. In this #GRCChat recap, participants discuss the perks and the pitfalls of active cyberdefense strategies.

  • November 25, 2014 25 Nov'14

    Apple's consumer privacy practices in the government's crosshairs

    As U.S. federal agencies put tech giants' data security practices under the microscope, consumer privacy issues are on everybody's minds. Also in privacy news: Two U.S. business alliances are ...

  • November 13, 2014 13 Nov'14

    GRC, security pros seek more authority to reflect vital business role

    As their roles become increasingly integral to corporate success, IT security and compliance professionals want more input during business decisions.

  • November 03, 2014 03 Nov'14

    How to build on PCI DSS regulations and confront mobile payment apps

    Compliance with PCI DSS regulations is only the start of a sound security strategy. In this #GRCChat, participants discuss additional measures to protect data and the complexities around mobile payment applications.

  • October 30, 2014 30 Oct'14

    Apple Pay sidesteps compliance rules; FCC takes first privacy action

    Apple Pay rolled out to much fanfare earlier this week, but may have bypassed some compliance requirements that Apple's mobile payment rivals have to maintain. In other recent headlines, the FCC ...

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close