New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Risk and compliance strategies and best practices News
February 19, 2018
Regulatory initiatives remain at the top of GRC pros' lists of tech projects, according to TechTarget's annual IT Priorities 2018 survey, but grab less attention than last year.
December 12, 2017
Go ahead and check out cutting-edge software for airtight IT security, Harvard Business School's CTO says. But first, renew your focus on cyberattack prevention.
November 16, 2017
Efforts to establish public and private sector cybersecurity cooperation have stalled in recent years, but high-profile incidents could be turning the tide.
October 31, 2017
How do you solve a problem like your risky-email-clicking employees? Train them, and make software easier, Xerox CISO Alissa Johnson says in this video.
Risk and compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
The FTC has issued its first enforcement actions for companies found in violation of the EU-U.S. Privacy Shield Framework, but are the rules doing enough to protect consumer data? Continue Reading
Compare a traditional network perimeter configuration with cloud cybersecurity and see if this new kind of security platform can improve your business continuity. Continue Reading
Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss. Continue Reading
Evaluate Risk and compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
For Xerox CISO and former White House deputy CIO Alissa Johnson, cybersecurity lessons learned in the public sector are proving relevant in her current role. Continue Reading
Xerox CISO Alissa Johnson says U.S. companies will be forced to reconsider their information protection strategies as consumers' data privacy protection expectations evolve. Continue Reading
Shadow IT risk continues to plague companies, but some are finding ways to allow citizen developers to use these unsanctioned applications -- with certain restrictions. Continue Reading
Manage Risk and compliance strategies and best practices
Learn to apply best practices and optimize your operations.
To ensure wearable device security, organizations can no longer get by with aged approaches, said Boeing's Brian Laughlin. Continue Reading
The competitive edge that IoT, blockchain and other cutting-edge tech can deliver also brings new security threats. Read about how to mitigate emerging technology risks. Continue Reading
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help. Continue Reading
Problem Solve Risk and compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Speed-to-market strategies shouldn't be bogged down by IT security. Here are two steps that will help CISOs adapt governance practices to support IT speed. Continue Reading
Outmoded stereotypes, not enough female execs -- there are many reasons for the low numbers of women in cybersecurity. Most (but not all) are easily fixed. Continue Reading
Despite their name, containers are by no means impervious to threats. With their use expected to grow, the time is ripe for determining the best security for containers. Continue Reading