Compliance

Gartner survey says cloud computing remains top emerging business risk

Latest Emerging Risks Report reveals new threats to global enterprises as cloud growth booms.

Gartner forecasts worldwide information security spending to exceed $124 billion in 2019

Detection, response and privacy driving demand for security products and services.

Open banking APIs: Huge opportunity for fintechs

Digital identity management specialist ForgeRock clearly sees the new open banking regulations popping up across the UK, Europe and New Zealand as a huge opportunity.

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Partner Content
India’s NEW Personal Data Protection Law is almost here. Are you ready?

With the Indian Government releasing the Justice BN Srikrishna Committee of Experts Report on Data Protection recently, a new law in the form of the Personal Data Protection Bill, 2018, is all set to soon become a reality in India.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Partner Content
Your enterprise data may be just a search away: Secure it now

There are a whole host of reasons why organizations should consider encrypting their sensitive data: for protection, for legal reasons, to comply with global compliance policies and safeguard customer interests. 

Partner Content
Unstructured data: The unseen dangers

Unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures.

Partner Content
Tailgating: Security Risks Involved

Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?