By Joe Mont2015-07-14T11:30:00
By now every compliance officer has already heard the warning that it’s a matter of when you suffer a cyber-security breach, not if. Then comes compliance with breach disclosure rules—and those demands are becoming as perplexing as the cyber-threat itself. Overwhelmed, compliance officers are seeking ways to navigate these demands ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-09-09T14:45:00Z By Jaclyn Jaeger
Image: A federal appeals court has upheld the Federal Trade Commission’s efforts to sanction companies for poor data security practices—which opens a new front of cyber-security compliance and legal risks for Corporate America. “Basically, if consumers trust you with data, you need to use reasonable business efforts to honor that ...
2015-08-04T14:30:00Z By Edith Orenstein
Image: Gone are the days when “access control” meant locking your door or filing cabinet. Now compliance, IT, and audit teams must collaborate on controls to access networks rather than physical stores of information. Inside, we look at three best practices to design strong access control and at how to ...
2026-01-06T13:16:00Z By Ruth Prickett
While companies focus on the risks, opportunities, and regulations emerging around AI, the next tech challenge is already on the horizon. Quantum computers are here – and so are the associated crime risks, plus some encryption protections.
Site powered by Webvision Cloud