By John Reed Stark2015-10-14T10:15:00
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
2015-12-08T09:00:00Z By John Reed Stark
Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.
2025-11-14T22:29:00Z By Adrianne Appel
A California privacy agency plans to seek a whistleblower law, to encourage corporate employees and others to step forward with complaints about egregious privacy violations at their workplaces.
2025-10-30T19:39:00Z By Neil Hodge
Companies could face significant compliance challenges in trying to meet new EU legal requirements about how companies share data with third parties.
Site powered by Webvision Cloud