More Cybersecurity Articles

Cybersecurity

Data Mapping for Global Privacy Compliance

It has been a year since the Safe Harbor framework was invalidated by the European Court of Justice. That framework allowed U.S. companies that registered with the Federal Trade Commission to legitimately transfer data from EU member countries to the U.S. At the time the Safe Harbor was invalidated...

Read More

Technology

The Cyberthreat Within: As companies wake up to insider threats, C-suite executives are looking beyond IT for help

Two of the most insidious myths about cybersecurity are that most threats originate outside an organization – Russian hackers, for example – and that it is an IT problem. Amie Taal, a cybersecurity expert with Deutsche Bank, Jenny Le, who runs operations for e-discovery provider FRONTEO...

Read More

Cybersecurity

After the Data Deluge: “Keep it all, keep it forever” won’t do any longer. As paradigms shift, information governance, including defensible data remediation, takes center stage

Most experts agree that a sound information governance and data remediation program is vital to driving an organization’s business and reducing its risk profile. But how and why and when and with whom are all questions under active consideration. In this interview, Therese Craparo of Reed...

Read More

Recent Cybersecurity Video