Governance and Risk

From regulatory compliance to corporate governance structure, everyone is involved

Why the Data Security and Breach Notification Act Is Drawing Ire

24 Mar, 2015

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. ...More >

Cybersecurity Project Targets Better Patient Health

17 Mar, 2015

Better outcomes for patients is the added level of urgency in cybersecurity efforts for health care organizations. ...More >

A Positive Spin on Security as Business Enabler

10 Mar, 2015

A message on the full range of benefits of security tools and approaches can help bring executives and the board closer together on strategic planning. ...More >

Encryption Not a Black and White Approach

13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case. ...More >

Cybersecurity Insurance, IT Processes Melding into New Approach

11 Feb, 2015

Awareness of the breadth and depth of damages from data breaches is boosting demand for increasingly sophisticated cybersecurity insurance products, says MetricStream's Yo Delmar. ...More >

Heartland Protects Merchant Customers with Breach Warranty

12 Jan, 2015

Small businesses may start to see more warranty products offered like Heartland's Heartland Secure. ...More >

Intel Takes on Password Responsibility, Acquires PasswordBox

01 Dec, 2014

Intel doubles down on password-based security with today's acquisition, despite severe vulnerabilities in the approach. ...More >

Pew: Experts Expect Significant Cyberattack by 2025

29 Oct, 2014

The Pew Research Internet Project collected predictions and thoughts about coming cyberattacks from over 1,600 experts. They are not optimistic. ...More >

Chamber of Commerce Set to Hold October 28 Cybersecurity Summit

21 Oct, 2014

Heavy hitters from federal agencies, the executive and legislative branches and private enterprise will spend the day discussing the NIST Cybersecurity Framework and other actions. ...More >

Who Will Be Held Responsible for Personal Info Breaches

01 Oct, 2014

What happens with customers in the aftermath of a breach can often be hard to discern, so surveys like this one help companies predict behavior. ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date