EU Data Act: Time for a Reality Check
New rules could spark compliance tension: share too much personal data run afoul of GDPR, share too little and face Data Act enforcement
Read moreDetailsThe Internet of Things(IoT) creates unique compliance and risk challenges. It’s a system of interrelated computing devices, mechanical and digital machines, objects, animals — or even people — that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
New rules could spark compliance tension: share too much personal data run afoul of GDPR, share too little and face Data Act enforcement
Read moreDetailsProfessionals in the risk management field have shifted gradually away from a siloed approach to a more integrated approach. As most of us know, however, the switch is not easy; it can be overwhelming to keep on top of the full range of enterprise risks. John Verver posits that technology ...
Read moreDetailsRisk management has undergone a sea change over the past few decades, yet risk management practices have evolved very little. scarcely evolved to keep pace. Though organizations enjoy robust technological capabilities, they grow more fragile and vulnerable to massive systemic risks all the time. A risk program centered on human ...
Read moreDetailsThe Fourth Industrial Revolution is coming, and organizations must bolster their internal audit and compliance functions now to keep pace and minimize risk.
Read moreDetailsWhy It’s Time for a Next-Gen Solution As organizations’ computing infrastructure expands, legacy asset management systems are becoming inadequate. To keep pace with this technological change – and remain compliant – companies must adopt a next-generation approach. Mark Gaydos of Nlyte discusses. Imagine being charged by your cable company for ...
Read moreDetailsCyberattacks cause great harm to the business world due to their evolving nature, and it is expected that cyberattacks will cost businesses $6 trillion worldwide next year. Keepnet Labs reveals its latest research on the most vulnerable sectors and internal departments affected by cyberattacks. While cyber attackers chase down system ...
Read moreDetailsProvides critical solutions for the work-from-anywhere environment to address massive shifts in operational models, changed IT ecosystems and technology sprawl San Francisco, California (March 9, 2021) – Businesses need ready access and a single source of truth to provide accurate, real-time data for IT infrastructure to support a work-from-home, in-office ...
Read moreDetailsIoT risk management and security don’t seem to get the attention they deserve until there’s a data breach. KnowBe4’s James McQuiggan discusses the often-overlooked cyber risk associated with using IoT devices and what organizations can do to protect themselves. Thinking back a few weeks ago to a family movie I ...
Read moreDetailsCyberattacks on connected devices continue at a rapid pace, and regulators are well aware of this fact. Access Partnerships’ Maria Zervaki discusses the past year of regulations surrounding the internet of things, as well as predicted upcoming topics in IoT regulation. Although it’s already two decades old, the internet of ...
Read moreDetailsThird-Party Risk Factors Require More Board Level Attention on IoT Security Santa Fe, NM (May 7, 2019) – The Santa Fe Group, authorities in risk management and the managing agent of the Shared Assessments Program today released the results of the Third Annual Ponemon Institute’s study on Third-Party Risk for the Internet ...
Read moreDetailsFrom Google's GDPR violation to data breaches happening just hours after the new year, 2019 is off to a crazy start, especially for risk managers. In anticipation of the months ahead, LogicGate CEO Matt Kunkel predicts what GRC professionals should be prepared for in 2019. There’s no doubt risk managers ...
Read moreDetails3 Emerging Areas of Concern Information Security Forum recently released "Top Emerging Threats for 2019," an annual outlook on the top global security threats businesses may face in the coming year. ISF’s Steve Durbin provides insight into some of the most pressing threats organizations should be aware of. It’s that ...
Read moreDetailsFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2026 Corporate Compliance Insights
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |