By John Reed Stark2015-10-14T10:15:00
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-12-08T09:00:00Z By John Reed Stark
Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.
2025-12-10T15:30:00Z By Neil Hodge
For the past decade, Europe has led in creating strong but flexible rules for data use and safe AI development. The EU’s new plans to simplify key data privacy and AI governance measures have received a mixed response.
2025-12-10T15:29:00Z By Mark Diamond, CW guest columnist
Companies are giving their records management programs a makeover, and not for the reasons you may think. What used to be a sleepy back-office legal department function is now front and center, often driven by compliance teams. Organizations are discovering that a “save everything, forever” de facto policy doesn’t ...
Site powered by Webvision Cloud