Please turn on your JavaScript for this page to function normally.
idea
Three areas legal leaders should focus their technology efforts in

As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology …

risk
Implementing risk quantification into an existing GRC program

With a myriad of risks and limited security budgets, how do organizations decide which projects to prioritize? Many governance, risk management and compliance (GRC) …

businessman
Mobile app creation: Why data privacy and compliance should be at the forefront

In today’s mobile app landscape, providing customers with the most tailored and personal experience possible is essential to edging out competitors. But creating such a …

gears
Enterprise automation adoption surging, security and compliance area jump by 171%

Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as …

compliance
Compliance failures caused by lack of embedded controls into employee processes

Compliance teams that don’t embed their controls into employee processes face a significantly higher rate of compliance failures, according to a survey by Gartner. The survey …

containers
Increasing number of investigations calls for advanced technology and dedicated teams

Compliance Week conducted a survey which shows the importance of both advanced technology and dedicated teams that can quickly deliver data insights to reduce time and cost …

Healthcare IoT
What is the HIPAA Security Rule? Three safeguards to have in place

The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …

container
Security and compliance still a challenge for container architectures

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

cloud
Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

hands
If encryption is so good at protecting data, why do so many businesses succumb to cyberattacks?

Cybercriminals use increasingly complex deception methods, and cybersecurity can be unfamiliar, unintuitive, or inconvenient to operate, recent Mimecast research reveals. No …

GDPR
SMEs awareness of GDPR is high, but few adhere to its legal requirements

85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering …

arrows
Stop the breaches! Four steps to minimize security risks

Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …

Don't miss

Cybersecurity news