Building and managing a security program is an effort that most organizations grow into overtime. I have worked with startups who had no rules for how assets or networks were used by employees. I also ...
With last year’s proposed amendments from the SEC on cybersecurity risk management, strategy, governance and incident disclosure by public companies gaining more support, chief information security ...
Infosecurity professionals are being challenged to justify the need for investment in security programs and resources. Why? Because organizations struggle to understand how to measure the return on ...
Every organization, regardless of size or the revenue it generates, needs a security program. According to a recent International Data Corporation (IDC) report, "By 2027, the average enterprise will ...
As it pertains to the Gramm Leach Bliley Act and the Health Insurance Portability and Accountability Act of 1996, Safeguarding of Electronic Customer Information and Protected Health Information ...
In a sign of how pervasive data sharing has become, businesses may face challenges complying with a new government rule restricting data use outside the US. The US Department of Justice's (DoJ) Data ...