Risk and compliance strategies and best practices News
December 16, 2016
News of a 2013 Yahoo breach will likely not be the jolt Americans need to become more cyber-savvy -- and that's scary. Also, Trump meets with tech leaders; FCC chair to resign.
September 30, 2016
Organizations look to encryption as a foolproof way of securing cloud information. But making the data unreadable to unauthorized users doesn't protect data from everything.
September 19, 2016
Cyberattacks today are a genuine threat -- and organizations need to take action, according to a quartet of cybersecurity experts.
July 27, 2016
The new data transfer agreement between the U.S. and the European Union has its detractors, but industry observers say, 'Give it a chance.'
Risk and compliance strategies and best practices Get Started
Bring yourself up to speed with our introductory content
Blockchain observers talk a lot about the widespread impact the technology will have on various industries, but pinpointing use cases and putting them into action isn't so easy. In July's CIO Decisions, dive into potential blockchain use ... Continue Reading
Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. ... Continue Reading
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Risk and compliance strategies and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem. Continue Reading
Well-designed compliance records management can generate new business revenue for businesses by feeding big data analytics engines valuable data. Continue Reading
The new transatlantic data transfer policy framework may require companies to rethink governance processes to follow its security and privacy protocols. Continue Reading
Manage Risk and compliance strategies and best practices
Learn to apply best practices and optimize your operations.
Etay Maor, executive security advisor at IBM, discusses the growing ransomware threat and why IoT could be the next ransomware target. Continue Reading
In this CIO Minute video, CTO Niel Nickolaisen shares his thoughts on mitigating mobile security risks. Identifying the sources of risk is just the first step. Continue Reading
Mobile technology usage is growing just as the number of threats facing mobile data is growing. CIOs must combat mobile security issues to stay ahead in the mobile-dominated world. Continue Reading
Problem Solve Risk and compliance strategies and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
MIT Sloan cybersecurity expert Stuart Madnick talks about clear and present dangers in an IoT-enabled world. Continue Reading
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why. Continue Reading
According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our ... Continue Reading