Articles
Security threats are not a matter of if, but when, here's what cyberthreats you should be on the lookout for.
Continue reading...
Any objective will have multiple associated risks. How can you aggregate multiple sources of risk to reach a final assessment?
Continue reading...
Under the EU's General Data Protection Regulation, consumers will have the right to be forgotten, but they may also want the right to be remembered.
Continue reading...
Patch management is a key to data security. Here's a look at the patch management life cycle and points to consider when drafting a patch management plan.
Continue reading...
Using game theory to aid decision making is a natural fit in the business environment.
Continue reading...
While prediction pieces rarely come true, these four trends in InfoSec are very likely to shape our conversations in the year(s) to come.
Continue reading...
Building a cross-departmental digital policy alliance can strengthen your argument when you approach the C-suite
Continue reading...
Identifying and reacting to the initial risk is relatively easy. Taking into account all of the resulting risks this action creates is the hard part.
Continue reading...
The Equifax breach illustrates why building a layered approach to cybersecurity is critical when dealing with sensitive data
Continue reading...
Internal auditors put their own roles at risk if they fail to focus on the broader business's success
Continue reading...
With the EU's General Data Protection Regulation (GDPR) scheduled to come into force next May, information management vendor Gimmal is upgrading its flagship solution, Workplace Compliance, to help businesses stay on the right side of the new regulations.
As part of the upgrade, Houston-based Gimmal’s Workplace Compliance app now includes
Continue reading...
Consumer credit reporting agency Equifax recently announced a massive security breach which exposed the data of 143 million US customers.
The stolen data included names, social security numbers, birthdates and home addresses.
Continue reading...
Whenever organizations bring external partners into their business processes, it raises security questions. How will those partners impact your company’s governance, risk and compliance policies?
It’s one thing to enable a business partner or consultant to deliver a core piece of your workflow, since your customers will hold you
Continue reading...
Allow me to state the obvious: Data is everywhere.
While it may sound basic to the point of insulting, it’s something even the best Compliance Officers can overlook.
Continue reading...