New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Risk management and compliance News
January 31, 2018
There is a new moonshot in cybersecurity, and Google's parent company is calling it Chronicle. Alphabet's cybersecurity business unit launched last week and plans on selling cybersecurity services ...
December 15, 2017
Despite recent high profile data security incidents, it seems business leaders still are not acknowledging their IT vulnerabilities: In a recent cybersecurity study, 20% of survey respondents cited ...
November 30, 2017
Cybersecurity incidents remain a growing risk for the enterprise in today's digital world. As a result, an organization's cybersecurity strategy usually isn't just about prevention anymore, but ...
November 16, 2017
Efforts to establish public and private sector cybersecurity cooperation have stalled in recent years, but high-profile incidents could be turning the tide.
Risk management and compliance Get Started
Bring yourself up to speed with our introductory content
For a cybersecurity program to be effective, CISOs must be viewed as business enablers. Kudelski Security's John Hellickson offers tips on how CISOs can make the transformation. Continue Reading
A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business. Continue Reading
An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria. Continue Reading
Evaluate Risk management and compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this SearchCIO Q&A, Javvad Malik discusses why streamlining infosec processes is becoming a top cybersecurity trend and how new tech influences the infosec industry. Continue Reading
Emerging tech has grown companies' data sets and made IT environments increasingly complex. As IT capabilities evolve, enterprise cybersecurity strategy is struggling to keep up. Continue Reading
Cybersecurity professionals' increased workloads leave little time for training, leaving their skill sets -- and their companies' data security -- vulnerable to outside threats. Continue Reading
Manage Risk management and compliance
Learn to apply best practices and optimize your operations.
A recent study found that as IT projects proliferate, cybersecurity's shortage of skills is leaving tech vulnerable. Analyst and study author Jon Oltsik explains in this Q&A. Continue Reading
As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at Balabit, discusses how to prep for Article 33 of GDPR. Continue Reading
Insider threat prevention has become inherent to cybersecurity strategy, but companies must use the right metrics to determine whether their efforts are working. Continue Reading
Problem Solve Risk management and compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hiring candidates from disciplines beyond infosec can go a long way to address the widening cybersecurity skills gap, says industry veteran Javvad Malik. Continue Reading
As information security budgets grow, cybersecurity spending needs to be focused on employee-centric areas like training to be effective. ISSA's Candy Alexander explains why. Continue Reading
Regulatory agencies offer broad guidance for compliance management system development, but companies may be best served by referring to widely accepted risk management principles. Continue Reading