All Technology articles – Page 26
-
ArticleAddressing fraud via social media
Fraud and social media have a special relationship, with the two frequently combining to cause harm, distress, and loss to an enormous number of people.
-
ArticleCompliance leadership panel: Current state, future trends, more
Four senior compliance practitioners shared their insights on maintaining an ethical culture, embracing data analytics, determining compliance’s role in measuring ESG metrics, and more as part of a panel discussion at Compliance Week’s National Conference.
-
ArticleFactors to consider when implementing risk assessment technology
With the growing demands of huge data sets, an everchanging regulatory landscape, and constantly evolving typologies, the challenge of assessing, documenting, and managing financial crime risk has never been greater.
-
ArticleFour years of GDPR: New tech testing data privacy law’s longevity?
It has been four years since the European Union’s flagship data privacy legislation came into force, but concerns are already being raised about whether the General Data Protection Regulation is being outpaced by technological developments and their use of data.
-
ArticleWells Fargo unit fined $7M for AML transaction monitoring failures
For the second time in five years, a subsidiary of Wells Fargo has been charged by the Securities and Exchange Commission with failing to file suspicious activity reports in a timely manner due to deficiencies in the system it used to flag transactions.
-
ArticleClosing the data risk gap: How technology enables data protection
Legal and compliance teams ranked data privacy and cybersecurity threats the No. 1 biggest risk entering 2022. Further survey results reveal roadblocks to organizations’ proactive compliance.
-
ResourceSurvey Report: How technology enables data protection
A Compliance Week and BRYTER survey analyzed 81 responses from compliance and legal practitioners who ranked data privacy and cybersecurity threats the No. 1 biggest risk entering 2022.
-
ArticleClearview AI fined $22M in Italy over unlawful data collection
Facial image aggregator Clearview AI was fined €20 million (U.S. $22 million) for unlawfully processing the biometric and geolocation data of Italian citizens in violation of privacy laws including the General Data Protection Regulation.
-
ArticleTop 10 reasons to attend Compliance Week 2022
A keynote with two SEC commissioners; interactive sessions on global sanctions, ESG, and ethical leadership; and a new conference location and format highlight Dave Lefort’s list of reasons to be excited for CW’s first in-person event in nearly three years.
-
ResourceWhite paper: How technology can power proactive risk management
Money laundering, cybercrime, corruption, trafficking: These are just a few of the many illegal activities that could be putting your business at risk, especially if you’re using outdated, manual processes.
-
ArticleTransparency key to navigating modern employee monitoring risk landscape
The opening session of Compliance Week’s virtual Cyber Risk & Data Privacy Summit addressed the challenges of using technology to monitor employees while considering regulatory and ethical risks.
-
ArticleIndictment: China-based Hytera stole trade secrets from Motorola
Hytera Communications allegedly conducted a scheme to systematically steal trade secrets from Motorola Solutions by hiring away Motorola employees who had developed its “walkie-talkie” product line, according to a federal indictment.
-
PremiumChapter 4: Recovery and lessons learned post-ransomware attack
Whether fictional private utility company Vulnerable Electric pays the ransom or not in the aftermath of its cyber incident, the two pathways quickly splinter off in different directions with varied endings, each with important lessons to be learned.
-
PremiumEpilogue: What happened to Betsy?
The “patient zero” of fictional private utility company Vulnerable Electric’s ransomware crisis learns her fate.
-
PremiumChapter 3: Ransomware eradication prompts tough choice: To pay or not to pay?
No matter what, the deck is stacked against fictional private utility company Vulnerable Electric as it weighs whether to pay the $5 million ransom demanded by a cybercriminal who breached its systems. Which path do you take?
-
PremiumRansomware case study glossary
The field of cybersecurity features a growing list of terminology to describe the many forms, channels, and motivations behind cyberattacks and hacking culture. Learn further definitions for some key terms featured throughout the ransomware case study.
-
PremiumChapter 2, Part 1: Containment key to ransomware defense
With Day 2 of fictional private utility company Vulnerable Electric’s ransomware crisis comes the need to grasp the extent of its situation. The cyber incident response team’s synchronized efforts are pivotal as time is of the essence.
-
PremiumChapter 2, Part 2: Ransomware damage control and when to alert stakeholders
Systems at fictional private utility company Vulnerable Electric remain impacted in the aftermath of a ransomware attack, but the chief executive decides it’s time to be forthright with employees and customers.
-
ArticleSurvey: Privacy budgets rise as businesses see consistent ROI
Companies believe effective privacy management improves trust, transparency, and provides a return on investment, according to the latest benchmark study by technology vendor Cisco.
-
PremiumChapter 1, Part 1: Betsy’s human error triggers ransomware crisis
When one of fictional private utility company Vulnerable Electric’s most dedicated employees falls victim to a social engineering hack, her actions in the immediate aftermath are crucial to what will soon become a crisis for the C-suite.


