New & Notable
Managing compliance operations News
February 07, 2019
Reinvesting in SOCs and crafting clear risk appetite statements made the list of Gartner's top security and risk management trends. Experts sound off on what's driving these trends.
December 19, 2018
The top 2018 cybersecurity and compliance articles make a few things clear: digitization increases risk and requires innovative strategies to protect against evolving data threats.
November 16, 2018
Extended product lifecycles, consumer apathy and lacking federal regulation lead the top IoT security challenges in corporate settings.
October 31, 2018
At Gartner Symposium 2018, analyst Peter Firstbrook highlighted the emerging trends in security that cybersecurity pros -- and their employers -- need to prep for in the next year.
Managing compliance operations Get Started
Bring yourself up to speed with our introductory content
Smart tech promises security and other benefits, but they don't come automatically. Learn how these tools work and where they can work best in your organization. Continue Reading
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense. Continue Reading
Organizations that handle California consumer data have a year to comply with CCPA. Expert Steven Weil discusses what enterprises need to know about the California privacy law. Continue Reading
Evaluate Managing compliance operations Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Tufin Technical Director Joe Schreiber highlights how automating security operations can benefit an organization and discusses best practices for effective implementation. Continue Reading
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7. Continue Reading
Each layer of the Open Systems Interconnection presents unique -- but connected -- vulnerabilities. Here's how to establish OSI security and compliance best practices. Continue Reading
Manage Managing compliance operations
Learn to apply best practices and optimize your operations.
Is your organization ready to build a computer security incident response team? Here are the questions that should be answered when building a CSIRT to maximize incident response capability. Continue Reading
For cybersecurity strategies to be successful, digitized companies must find the balance between the benefits and risks that come with rapidly advancing IT innovation. Continue Reading
In this Ask the Expert, IT governance expert Jeffrey Ritter discusses his formula to successfully align new technology with ITSM compliance standards -- all while minimizing risk. Continue Reading
Problem Solve Managing compliance operations Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The GDPR deadline has long passed, but U.S. companies remain behind on compliance. Experts provide GDPR compliance tips to make sure IT is on the right side of the privacy rules. Continue Reading
As IT executives continue to wrap their heads around GDPR, strategies are emerging to ease its data management compliance burden. Here are five that are already proving effective. Continue Reading
It's important to remember that artificial intelligence data and AI algorithms must hold up against GDPR regulations. Here's where GDPR and AI intersect and what CIOs can do to remain compliant. Continue Reading