At the Raines Cybersecurity Leadership webinar, cyber expert Elad Yoran discussed the essential traits of a CISO and why businesses should incorporate a security voice in their boardroom.
In another lawsuit this year, two truck companies were found negligent in their hiring practices, not performing due diligence when it came to hiring drivers for their companies.
With GDP growth on the continent reaching its highest rate since 2012 and long-term prospects equally favorable, Africa holds great promise for investors. But alongside opportunities, foreign enterprises face vast gaps in their knowledge of the business landscape.
If you and your program are not viewed as adding value and assisting the business in executing its strategy, then you are relegated to a draw on overhead or worse yet a necessary evil. If you are viewed as the latter, it might be time to brush up your resume, as your days may be numbered.
Ok, everyone has heard about The Internet of Things (IoT) and Big Data. So, that on its own is not much of a prediction. But this prediction is about IoT and you.
In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.
On January 1, 2014, California implemented an amendment to its breach notification law. The law applies to companies doing business in California that experience a security breach exposing personal information.
Background screening is often the first line of defense against insider threats in an enterprise,
January 28, 2014
Background screening is often the first line of defense against insider threats in an enterprise, but according to Employment Screening Resources CEO and Founder, attorney Lester Rosen, “2014 promises to be the year of challenges in screening.”
Employers have long recognized that conducting due diligence on new hires is a mission critical task. When it comes to any position dealing with Information Technology (IT), the stakes go up exponentially due to the sensitive nature of access to data and systems that operate the company.