All IT Security Technology articles
-
Video
The Business Case for Audit & Risk Management Software: Driving Efficiency and Compliance
This panel will explore how businesses can build a compelling case for investing in these solutions, emphasizing their role in enhancing operational efficiency, improving risk visibility, and ensuring compliance.
-
Video
The Human Firewall: Cultivating a Cybersecurity-First Culture
This session will explore the critical role of cultivating a cybersecurity-first culture within organisations to empower employees as active participants in securing sensitive data and systems.
-
Feature
Steering Through the Digital Storm: Mastering IT Risk in 2025 and Beyond
The year 2025 is poised to be another year of rapid technological change and escalating cyber threats, making IT risk management a top priority for organisations of all sizes.
-
Feature
The Great AI Race: China, Deepseek, and the Global Quest for Supremacy – and its risks
The 21st century is witnessing a new kind of arms race, not with traditional weapons, but with algorithms and data.
-
Feature
The AI-Crypto Nexus: Navigating the Risks and Rewards of a Transformative Convergence
Two technological tidal waves are converging: Artificial Intelligence (AI) and Cryptocurrency. Individually, each has the power to reshape industries and redefine how we interact with the world.
-
Webinar
Closing the Gap: A Practical Approach to Automating IT Risk & Data Discovery
Webinar produced by GRC World Forums in association with OneTrust
-
Q&A
Meet the expert: Onur Korucu to speak at PrivSec Global
We are very happy to announce that Information Security, Compliance, and Privacy professional, Onur Korucu will speak at PrivSec Global.
-
Webinar
How ITDR Helps Battle Identity Theft
Webinar produced by GRC World Forums in association with ManageEngine
-
Q&A
Meet the expert: Ernestas Bartkevičius to speak at PrivSec Global
We are very happy to announce that digital ID and GRC specialist, Ernestas Bartkevičius will speak at PrivSec Global, this month.
-
Q&A
Meet the expert: Martin Gomberg to speak at PrivSec Global
We are delighted to announce that “The Privacy CIO” Martin Gomberg will speak at PrivSec Global, this month.
-
Q&A
Meet the expert: Jenni Parry to speak at PrivSec Global
We are very happy to announce that Cyber Risk leader, Jenni Parry will speak at PrivSec Global, this month.
-
Q&A
Meet the expert: Alexandra Khammud to speak at PrivSec Global
We are very happy to announce that Information Security chief, Alexandra Khammud will speak at PrivSec Global, this month.
-
Q&A
Meet the expert: Igor Gutierrez to speak at PrivSec Global
We are very happy to announce that Information Security leader, Igor Gutierrez will speak at PrivSec Global, this month.
-
Webinar
3 Forward-thinking Practices to Manage IT Risk
Webinar produced by GRC World Forums in association with Auditboard
-
Q&A
Meet the expert: Sudha Madhusudhan to speak at #RISK Amsterdam
We are delighted to announce that GRC leader, Sudha Madhusudhan is to speak at #RISK Amsterdam, opening this month.
-
News
Corporate secrets readily available on recycled company routers
New research into the fate of corporate network devices sold and bought on the secondary market represents a major cause for security concern.
-
News
Hybrid working may undermine organisational security
The impact of hybrid work on organisational security is a top concern for chief information security officers (CISOs), according to a new study.
-
Feature
Meet the expert: Tim Burnett to speak at PrivSec London
We are very happy to announce that Cyber Security and Compliance chief, Tim Burnett will be speaking at PrivSec London, next week.
-
Feature
Managing Business Risks: Walking the Tightrope to Growth — #RISK
Companies are stepping up investment in IT, digital transformation and cybersecurity even amid warnings of an imminent recession, a recent PwC survey found.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?