By Jaclyn Jaeger2016-01-12T09:30:00
As attacks on corporate networks become more common, companies are getting more adept at protecting their most valuable assets against cyber-threats outside the company, but it’s the insider threats that continue to elude many. Inside, we walk through the difficult part of insider-threat programs: not just creating the program and ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2017-01-24T08:45:00Z By Jaclyn Jaeger
To better manage and prevent insider-risk exposure, companies still have much to learn both from corporate data breaches of the past and from those that have developed best-in-class insider-threat programs. Jaclyn Jaeger has more.
2026-02-02T12:32:00Z By Ashwathama Rajendran CW guest columnist
Generative AI (GenAI) has moved rapidly from experimentation into day-to-day use across many organizations. Over the past year, teams have shifted from exploratory pilots to relying on these tools for core activities such as contract analysis, research, and software development.
2026-01-16T20:32:00Z By Oscar Gonzalez
The U.S. Federal Trade Commission finalized its order against General Motors and its OnStar subsidiary over the improper usage of geolocation and driving behavior data of drivers.
Site powered by Webvision Cloud