Governance and Risk

From regulatory compliance to corporate governance structure, everyone is involved

Chamber of Commerce Set to Hold October 28 Cybersecurity Summit

21 Oct, 2014

Heavy hitters from federal agencies, the executive and legislative branches and private enterprise will spend the day discussing the NIST Cybersecurity Framework and other actions. ...More >

Who Will Be Held Responsible for Personal Info Breaches

01 Oct, 2014

What happens with customers in the aftermath of a breach can often be hard to discern, so surveys like this one help companies predict behavior. ...More >

More than a Name Change: ISIS Mobile Wallet Becomes Softcard

17 Sep, 2014

Even if users aren’t turned off by security and privacy worries, they don’t see the benefit of switching from using credit cards to using their phones to make payments. ...More >

Internet Slowdown Protest Planned to Support Net Neutrality

04 Sep, 2014

On September 10, organizers hope that as many websites as possible will participate in the protest by displaying a symbolic “site loading” icon on their home pages. ...More >

California Ruling on Reimbursements to Complicate BYOD

18 Aug, 2014

The death of BYOD? Some say so, after a California Court of Appeals landmark ruling. ...More >

Major Security Breach Disclosure Restarts Debate

08 Aug, 2014

Security researchers are often criticized for the ways they disclose and report security breaches they have discovered, no matter how they approach the situation. ...More >

President Obama Expected to Sign Cell Phone Unlocking Bill

28 Jul, 2014

Benefits of the bill include increased competition between carriers, ease of switching for consumers, and increased and easier sales of second-hand phones. ...More >

Data Breach Damage from NY’s POV: Over 1 Billion in 2013 Alone

17 Jul, 2014

The New York Attorney General's office attempts to illustrate the exponential growth in breaches, reports of breaches and some of the related costs. ...More >

Can Internet of Things and Privacy Co-Exist?

10 Jul, 2014

Governmental regulation can't keep up with the pace of development. If it could, would it be effective? ...More >

BYOD Can Threaten More Than Network Security

03 Jul, 2014

BYOD creates less quantifiable problems for IT and the rest of the user base, including job loss fears, worry about increased working hours and uncertainty about security issues. ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data