- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Lori Tripoli2019-11-14T20:36:00
Although the Payment Card Industry Data Security Standard (PCI DSS) launched back in 2004, 15 years later, most organizations still struggle to adhere to it.
2025-06-10T15:26:00Z By Aaron Nicodemus
There are stories we tell ourselves in third-party risk management (TPRM) to make ourselves feel better about the corners we cut.
2025-06-04T20:56:00Z By Ian Sherr
Compliance is increasingly in the spotlight as companies are tackling everything from artificial intelligence and other new technologies to risk management and mitigation. But it’s soft skills of communication and relationship building that are becoming the most critical tools for success.
2025-06-04T18:34:00Z By Ian Sherr and Aaron Nicodemus
Russia’s invasion of Ukraine has sparked a war with unusual implications: The U.S. has stepped up sanctions and export controls. But companies are increasingly learning that the most seemingly innocuous products can find themselves in “dual use,” as a product for daily life and a product for war. A gyroscope ...
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud