Changes to digital spaces in recent years have led to a sharp rise in IT risk for many organizations. With cloud adoption, digital processes, remote work and third-party relationships growing dramatically, new, complex and expanded threat landscapes now exist —...
Read moreA third-party supply chain cyber attack against computer chip giant Applied Materials, expected to result in losses of $250 million, won’t be the last one targeting down-stream suppliers, according to an analysis by British cybersecurity provider Risk Ledger. In fact,...
Read morePhishing attempts are only growing more sophisticated by the day, and effective cybersecurity means defending all the vectors of attack, particularly the human ones, as they’re the most vulnerable. KnowBe4’s Perry Carpenter talks about establishing a defense-in-depth strategy and how...
Read moreOrganizations want to embrace all the benefits the cloud has to offer while still protecting their sensitive data. Engaging a cloud provider who practices security by design is a good first step, it’s far from the first one. Greg Tatham...
Read moreThe FTC says Drizly’s CEO James Cory Rellas was alerted to a potential security loophole two years before a data breach exposed the personal information of 2.5 million customers of the alcohol delivery service. So egregious were Rellas’ actions, according...
Read morePerhaps once distinct teams within organizations, security and compliance functions today go hand-in-hand — or at least they should, writes Sumo Logic CSO George Gerchow. Data breaches continue to wreak havoc on today’s enterprise, with rising stakes of both cost...
Read moreIn our hyper-connected world, just about every company is a tech company. As commerce and technology become increasingly intertwined, it’s even more important for senior executives and board members to ensure they have basic technological understanding, and Protiviti’s Jim DeLoach...
Read moreCyber threats against organizations of all sizes are only rising as scammers and fraudsters become more and more sophisticated. Kyung Kim and Sara Sendek of FTI Consulting dig deep into the recently released CISA strategic plan for tips on adopting...
Read moreIn decades past, independence (a flawed measure even in good times) was considered the gold standard of audit. But Strike Graph’s Justin Beals argues that it’s well past time to catch up with technology and instead rely on transparency as...
Read moreAs the sophistication level of cyber attackers continues to rise, there’s probably not a business on Earth that isn’t at risk. While the day-to-day management of the cyber threat falls to others, as Protiviti’s Jim DeLoach explores, company boards need...
Read moreLet’s face it: Nobody wants to be audited. For the average Joe, an IRS audit is a hassle (at best). And in the corporate world, the word itself is sure to draw ire. But Drata’s Troy Fine talks about the...
Read moreWe don’t know exactly what will be in the upcoming national cybersecurity strategy. But, as FTI Consulting’s Anthony J. Ferrante explains, the policy will almost certainly be an improvement on the status quo. National Cyber Director Chris Inglis has said...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |