Sign in
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Security Talk
Home
GRCInsights
News
Conferences
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Privacy Policy
Password recovery
Recover your password
your email
Search
.
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Multifactor Authentication
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Server Security
Third Party Risk
Threat Management
Vulnerability Management
Web Security
Zerotrust Security
GRCInsights
About us
Conferences
APAC
CANADA
EUROPE
LATAM
MIDDLE EAST
US
Search
Linkedin
Twitter
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Multifactor Authentication
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Server Security
Third Party Risk
Threat Management
Vulnerability Management
Web Security
Zerotrust Security
GRCInsights
About us
Conferences
APAC
CANADA
EUROPE
LATAM
MIDDLE EAST
US
Search
Linkedin
Twitter
Home
Security
Security
Application Security
APIs in four facts: A summary for CXOs
By Omaru Maruatona, CEO, Aiculus
-
March 15, 2023
Application Programming Interfaces (APIs) pretty much run the internet. In 2017, it was estimated...
Application Security
Left Behind: The Unrealized Promise of Shift Left in Application Security
By Ketan Nilangekar, CEO & Co-Founder, Threatworx
-
March 15, 2023
Not long ago, the term "shift left" entered the lexicon of application security. A...
Application Security
The criticality of collaboration between AppSec and Engineering teams to ensure success
By Riyaz Rafi Ahmed, Security Software Engineer DevSecOps, Chargebee
-
March 15, 2023
Application security programs are vital to ensuring that every organization reduces the risk associated...
Multifactor Authentication
Realizing the transformational potential of digital wallets depends on assurance
By Joni Brennan, President, Digital ID & Authentication
-
March 15, 2023
Societal adoption of digital wallets can revolutionize the global economy by transforming how customers...
Application Security
How to win the race with hackers when new vulnerabilities are publicly disclosed!
By Frank S. Rietta, CEO, Rietta.com
-
March 15, 2023
Keeping deployed web applications up-to-date is imperative to prevent data breaches. It’s an existential...
Multifactor Authentication
How Identity Governance compliments MFA in protecting your data
By Craig Ramsay, CISSP, Omada
-
February 25, 2023
The benefits of well implemented multi-factor authentication (MFA) are apparent when it comes to...
Application Security
Securing the Future: The Evolving Role of CISOs in the Age of Digital Transformation
By Velayutham Selvaraj, Founder & Chief Information Security Officer, TwinTechSolutions
-
February 20, 2023
As technology advances, the role of the CISO has become increasingly complex and risky....
Data Loss Prevention
Data Breach – the regulatory landscape in the UK and Europe
By Philip Tansley, Partner, Osborne Clarke
-
February 7, 2023
Data breach is a ubiquitous threat for all organisation and exists regardless of their...
Data Loss Prevention
Data Protection is now a staple in our Digital Society
By Mickael Graham, Motivator & Project Manager, 876Writing Lab & Solutions
-
February 7, 2023
Data loss prevention (DLP) is a critical aspect of protecting a business from costly...
Data Loss Prevention
A Fresh Look at Business Continuity & Recovery Planning
By Pete Canavan, CEO and President, PJC Services
-
February 4, 2023
We have all received those emails from someone in a foreign country that has...
1
...
6
7
8
...
74
Page 7 of 74
Hot Topics
MOVEit incident highlights surging IT supply chain threats
The art of crisis management in logistics as possible support for warfare.
The Importance of Governance in Payroll Management: Mitigating Risk and Ensuring Compliance
Load more