News & Analysis as of

Data Breach Automation Systems Cyber Attacks

Accelerynt, Inc.

You Passed the Test. But Can You Survive the Attack?

Accelerynt, Inc. on

“Life can only be understood backwards; but it must be lived forwards.” – Søren Kierkegaard - Most security programs are designed to pass a test. Policies are documented. Controls are mapped. Tools are deployed. And for a...more

IR Global

New risks, new rewards - The Visionaries

IR Global on

The productivity paradox: Does more technology mean less growth? Nobel Prize-winning economist Robert Solow famously remarked, “You can see the computer age everywhere except in the productivity statistics.” This paradox...more

Foley & Lardner LLP

What to Expect in 2023: Trends in Cybersecurity & Data Privacy

Foley & Lardner LLP on

The New Year is in full swing and it’s time to consider the top trends in cybersecurity & data privacy our team expects to see throughout 2023. It will be an exciting year due to the myriad of new laws coming into effect, and...more

Mitratech Holdings, Inc

Why Digitize a Manual HR process? (& how to do it!)

See why and how some of today’s top HR departments are upgrading manual processes via digital transformation. As the battle for talent rages on amid the great resignation and regulations shift beneath our feet, Human...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide