Governance and Risk

From regulatory compliance to corporate governance structure, everyone is involved

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

16 Apr, 2015

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense. ...More >

Nation-State Attackers Require a Different Response

09 Apr, 2015

In the same way that the attackers took their time entering a system, the affected company can take its time isolating and studying the malware, rather than immediately sounding an alert. ...More >

Why the Data Security and Breach Notification Act Is Drawing Ire

24 Mar, 2015

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. ...More >

Cybersecurity Project Targets Better Patient Health

17 Mar, 2015

Better outcomes for patients is the added level of urgency in cybersecurity efforts for health care organizations. ...More >

A Positive Spin on Security as Business Enabler

10 Mar, 2015

A message on the full range of benefits of security tools and approaches can help bring executives and the board closer together on strategic planning. ...More >

Encryption Not a Black and White Approach

13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case. ...More >

Cybersecurity Insurance, IT Processes Melding into New Approach

11 Feb, 2015

Awareness of the breadth and depth of damages from data breaches is boosting demand for increasingly sophisticated cybersecurity insurance products, says MetricStream's Yo Delmar. ...More >

Heartland Protects Merchant Customers with Breach Warranty

12 Jan, 2015

Small businesses may start to see more warranty products offered like Heartland's Heartland Secure. ...More >

Intel Takes on Password Responsibility, Acquires PasswordBox

01 Dec, 2014

Intel doubles down on password-based security with today's acquisition, despite severe vulnerabilities in the approach. ...More >

Pew: Experts Expect Significant Cyberattack by 2025

29 Oct, 2014

The Pew Research Internet Project collected predictions and thoughts about coming cyberattacks from over 1,600 experts. They are not optimistic. ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date