Provided by
CyberGRX2021-02-03T06:07:00
The results show that while digital transformation is widely accepted as critical, the rapid adoption of it is creating significant vulnerabilities for most organizations — and these are only exacerbated by misalignment between IT security professionals and the C-suite. All 883 respondents are involved in managing digital transformation and cybersecurity activities within their organizations.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2026-01-06T13:16:00Z By Ruth Prickett
While companies focus on the risks, opportunities, and regulations emerging around AI, the next tech challenge is already on the horizon. Quantum computers are here – and so are the associated crime risks, plus some encryption protections.
2026-01-06T13:15:00Z By Ruth Prickett
What will be the critical tech issues for compliance in 2026? We asked experts what tech, digital, and cyber issues they believe compliance teams should be focusing on in the year ahead.
2025-12-29T12:00:00Z By Timothy Miller, CW guest columnist
The stress on cyberdefense teams can be accurately described as a form of chronic occupational trauma stemming from several unique pressures. But there are ways to build a culture that combats these pressures.
2025-11-11T19:24:00Z Provided by Sayari
This report quantifies, analyzes, and visualizes the impact of typological regulations on compliance so that teams can more efficiently and effectively protect against non-obvious sources of regulatory risk.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
Site powered by Webvision Cloud