According to Gemalto, a leader in digital security, more than one billion data records were breached in 2014, and 60 Minutes correspondent Bill Whitaker went so far as to deem 2014 “the year of the... View More
On April 29, 2015, Chief Justice John Roberts sent Congress a package amending 11 rules to the Federal Rules of Civil Procedure (FRCP)—rules that dictate trial procedures in federal district courts... View More
As I mentioned last time, the increasingly complex and evolving regulatory landscape is pressuring chief executive officers (CEOs) to increase the scrutiny on their own compliance and risk management strategies.... View More
Novitex, the leading provider of cloud-based solutions in the document outsourcing industry, today announced the next generation of Healthcare Connect, a communications management solution that combines... View More
Cybersecurity is top of mind, from the boardroom and C-suite to information technology (IT), legal, finance and more, but does that translate to effective policies and actions?... View More
The results of Protiviti’s 2015 “Vendor Risk Management Benchmark Study,” conducted in partnership with the Shared Assessments Program, can be viewed as cause for optimism—or concern,... View More
Zapproved, a pioneer in developing cloud-hosted software for corporate legal departments, today published the Legal Hold and Data Preservation Benchmark Survey 2015, the latest edition of the industry’s... View More
For information technology (IT) security managers, bring your own device (BYOD) is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation... View More
Many of the comments I hear from executives regarding information governance planning include: "We don’t want to boil the ocean." "There are too many conflicting definitions." "No one follows it
Everyone is talking about information governance (IG) and how it can be used to manage the rapid pace of electronic information growth. IG is defined by Gartner as, “The specification of decision
Videk, Inc. a leading provider of document integrity assurance systems has signed a significant distribution and sales agreement with Canon Japan, it was announced today. Videk will develop an integrated... View More
Governance, risk and compliance (GRC) technology that integrates multi-stakeholder requirements on a single platform is often held out as the holy grail of GRC—especially by GRC vendors. Nevertheless,... View More
Most organizations are critically dependent on technology to operate in the modern world. For these organizations, technology risk management often becomes a one-dimensional exercise: an obsession with... View More
What is top of mind for senior executives and directors this year? Regulatory changes and heightened regulatory scrutiny, succession challenges, economic conditions and cyber threats, according to the... View More
Protiviti partnered with North Carolina State University’s Enterprise Risk Management Initiative to conduct our third annual "Executive Perspectives on Top Risks" survey and obtained the views of... View More
Cybercrime targeting of commercial enterprises and organizations is rampant. Increasingly sophisticated, organized crime groups are gaining improper access to point-of-sale systems and corporate networks... View More
What do JPMorgan Chase, Home Depot, Target, Adobe, TJX and Sony all have in common? They have all been hacked and have given up tens of thousands or millions of records containing credit/debit cards, email... View More
Here we are in October already, a month known for tricks, treats and scary things lurking about waiting to frighten you. While it is a time for fun and social interactions, it is not a time you want to... View More
kloudtrack®and Formtree today announced a collaborative effort to integrate Formtree mobile data collection solutions with kloudtrack cloud-based data management and workflow systems. The integrated... View More
Thinking about mobile security keeps me up at night. It probably keeps you up too. On a recent evening, I was browsing the findings of a study by McAfee and Ponemon Institute titled “The Lost Smartphone... View More