There isn’t a silver bullet to consumer data privacy; different organizations are at different stages of privacy maturity. However, there are four steps organizations can take to advance their data privacy program maturity.
Crisis management leaders need to be able to communicate effectively and in real time in order to ensure the safety of their communities. When it comes to communication platforms, there are many aspects to consider when selecting the most secure tool for first responders.
It’s time to re-evaluate the modern data stack to relieve friction points and ensure both accessibility and compliance. By automating security workflows and controls across data stores and integrating into self-service access, productivity and innovation will thrive.
Elias Oxendine has been named Chief Information Security Officer (CISO) at Yum! Brands, a fast food provider operating Pizza Hut, Taco Bell and other restaurants around the globe.
The Federal Trade Commission (FTC) has issued a warning that it will pursue any company that fails to protect its customers’ data against ongoing Log4j attacks.
The "Beyond the Cyber EO: How to Build a Better Mousetrap" report from MeriTalk asked federal cybersecurity leaders for their thoughts on the May 2021 executive order on cybersecurity and how the field can move forward.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.