• October 29, 2014 29 Oct'14

    Is meeting PCI DSS standards enough to protect customer data?

    In the wake of several high-profile data breaches, #GRCchat participants discuss whether meeting PCI DSS standards is an effective step toward better customer data protection.

  • October 17, 2014 17 Oct'14

    JPMorgan Chase hackers compromised 13 other finance companies

    Online consumer security and privacy remains in the headlines as big-name companies continue to report cybersecurity breaches. Further investigations into the JPMorgan Chase cyberhack revealed that ...

  • October 08, 2014 08 Oct'14

    Data protection basics, education vital to mobile security policies

    The prevalence of BYOD and cloud means corporate data is exposed to a wider risk landscape than ever before, security experts say. Learn how to make sure your mobile privacy and security policies can withstand modern threats.

  • October 02, 2014 02 Oct'14

    Experts tackle crafting mobile privacy policies amid looming regulations

    As more corporate data loss and thefts dominate headlines, the number of mobile data-related regulations expands, and employees continue to hold user experience paramount, businesses must enact airtight mobile privacy policies, security experts say.

  • September 30, 2014 30 Sep'14

    Facebook's Atlas arms advertisers with deeper reach into user data

    Facebook has unveiled a new ad platform that promises marketers deeper insight into the data of billions of its users -- a move that has raises big concerns among privacy advocates. Also in data ...

  • Sponsored News

    • Why IT Leaders in the Education Space Struggle to Modernize

      When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More

    • 5 ways to accelerate time-to-value with data

      Organizations that embrace IT Transformation are 18x more likely to make faster, data-driven decisions—while also being more innovative, competitive and cost-efficient. With fast, automated access to real-world data from current workloads, you can expedite development cycles, eliminate silos and accelerate access to innovation. Here’s how. See More

    • 4 steps to making better-informed IT investments

      IT teams are under the gun to make data-based, future-oriented infrastructure investments to support IT transformation and cloud computing. Here’s how your organization can easily and efficiently collect, visualize, model and share real-world data from existing workloads to make faster and smarter decisions. See More

    • Modernize business-critical workloads with intelligence

      Modernizing your application portfolio demands that you analyze each app to identify cost savings and gaps in features and functions that could have a negative impact on your competitive posture or operational efficiencies. To do this most efficiently, you need actionable data about how applications and workloads are performing in your environment. See More

    View All Sponsored News
  • September 26, 2014 26 Sep'14

    Enterprise mobile security: Clear and thorough data usage rules key

    Participants in the latest #GRCchat discuss the importance of transparent data access and management policies to protect enterprise mobile security.

  • September 19, 2014 19 Sep'14

    Former staffers spill on Home Depot's lacking customer data protection

    Five former Home Depot employees claim the company lacked adequate customer data protection tools and that executives discouraged security system improvements that could have helped prevent the ...

  • September 12, 2014 12 Sep'14

    Social media, vendor management complicate legal discovery

    Participants in the latest #GRCchat discuss how to overcome the legal discovery challenges presented by vendor management and social media data.

  • September 04, 2014 04 Sep'14

    Post-hack focus on Apple iCloud security; Microsoft defies warrant

    Data privacy riddled tech headlines this week as Apple was forced to defend iCloud's security when hackers leaked celebrities' intimate photos. The tech giant also announced changes to its privacy ...

  • September 03, 2014 03 Sep'14

    Information governance policy key to big data e-discovery management

    Big data creates many e-discovery challenges, but participants in the August #GRCchat said a comprehensive information governance policy can help.

  • August 21, 2014 21 Aug'14

    Regulatory compliance challenges mount in recession's wake

    U.S. companies, particularly those in the financial services industry, continue to wrestle with compliance regulations: Recent headlines show that the current regulatory environment remains a top ...

  • August 08, 2014 08 Aug'14

    How automated compliance is likely to change GRC jobs

    As companies increasingly automate compliance data management, GRC professionals may be wary about job security. Our #GRCchat participants say that GRC pros will have to develop new skills in order to avoid being rendered obsolete.

  • August 07, 2014 07 Aug'14

    Tech giants play key role in ongoing data privacy debate

    The Internet user privacy debate is raging on multiple fronts lately, and some big names in the technology industry are getting in on the action. In the past few weeks, Facebook saw a European ...

  • July 31, 2014 31 Jul'14

    The benefits and drawbacks of regulatory compliance automation

    Increasingly complicated compliance mandates have led some businesses to implement automated processes to save resources. Participants in July's #GRCChat said compliance automation can assist data management, but also warned of unintended ...

  • July 23, 2014 23 Jul'14

    Risk landscape disrupts Wall Street banks and CISO roles

    Organizations of all stripes are feeling the impact of mounting risk. In the past few weeks alone: Wall Street's big banks reacted to a changing regulatory landscape; a new survey found that many ...






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...