Enterprise security and risk management

Security and risk mgmt

+ Show More

Enterprise security and risk management News

  • October 02, 2015 02 Oct'15

    Evaluating fingerprint biometrics in a post-OPM hack world

    The OPM breach called into question the safety of fingerprint biometrics. What can CIOs learn from it? Plus: Google unveils latest Nexus devices; Experian hack exposes 15 million T-Mobile customers.

  • August 21, 2015 21 Aug'15

    Will data privacy finally come to the fore, post-Ashley Madison hack?

    Moral questions abound after the Ashley Madison hack, but will the latest high-profile breach finally spur companies to improve consumer privacy? Also: Amazon's data-driven motivation tactics under scrutiny; Target reaches breach settlement.

  • August 20, 2015 20 Aug'15

    #CIOChat: Are enterprises ready to upgrade to Windows 10?

    Industry experts think Windows 10 will become the leading OS for enterprises. Will businesses jump on the bandwagon? Join #CIOChat on Aug. 26, at 3 p.m. EST to discuss.

  • August 07, 2015 07 Aug'15

    Windows 10 privacy brouhaha: Overblown?

    Many are crying foul over the new Windows 10 privacy policy, but are they really just crying wolf? Also in Searchlight: Hackers attack Yahoo through Flash bug; hitchhiking bot is beheaded.

View All News

Enterprise security and risk management Get Started

Bring yourself up to speed with our introductory content

  • Data security in a cyberthreat landscape

    President Obama couldn't have put the current state of cybersecurity better: "Whether it's phishing or botnets, spyware or malware, and now ransomware, these attacks are getting more and more sophisticated every day," he said at a summit at Stanford... Continue Reading

  • file shredder

    A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable. Continue Reading

  • Five steps to establishing a big data governance policy

    Modern companies generate and store an unprecedented amount of big data, but an information governance policy can help businesses stay compliant and reap the benefits of their digital assets. Continue Reading

View All Get Started

Evaluate Enterprise security and risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Enterprise security and risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Enterprise security and risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve