GRC Viewpoint
SecurityTalk
Sectors
Cyber Security
Threat Management
Endpoint Security
Physical Security
Digital Forensics
Network & System Security
Intrusion Detection
Incident Response
Enterprise Security
Cloud Security
Fraud Management
Infrastructure
Data Security
Enterprise Storage
Vulnerability Management
Identity Management
Access Management
Cyber Tactics
Access Control
Video Surveillance
Internet Security
Data Privacy
Vendor Risk Management
Endpoint Protection
KYC Solutions
IAM
InApp Protection
Online Safety
CMMC
Log Analysis
Security Compliance
Unified Thread Management
Storage and Backup Security
Investigation and Case Management
Disclosure Management
Penetration Testing
Corporate Entity Management
Operation Risk Management
Call Compliance
Data Privacy Management
IT Asset Management
Email Security
Application Security
Confidentiality
Network Security
Web Security
SCA
Sensitive Data Discovery
Privacy Impact Assessment
Data Subject Access Request
Consent Management
Policy Management
Audit Management
Identity Verification
Web Monitoring
Data Breach Notification
CISO
Business Continuity Management
Third Party and Supplier Risk Management
Data De-identification and Pseudonymity
Digital Signature
Regtech
Identity Governance and Administration (IGA)
Operational Resilience
Governance, Risk & Compliance
Managed Detection & Response
Edge Security
Storage Security
Enterprise DNS Protection
Dedicated Internet Access
Shared Internet
Remote Access
Dedicated Servers
Virtual Data Center
Project Unknown
Cloud Detection and Response
IT Managed
Facial Recognition
Advanced Security Management
DoS Protection
Vulnerability Assessment
Email Threat Protection
Digital Surveillance
Windows Security
Firewall Security Management
Document Management
Media Management
Time Tracking Software
Ticketing Software
Managed Application
Threat Intelligence
Confident Security
Detection and Response
Vulnerability Scanning
CPA Compliance
Wireless Security
Safety and Security
Cloud Forensics
Security Validation
Insights
News
Press Release
About Us
Facebook
Linkedin
Twitter
Home
GRC
Data Privacy Management
Data Privacy Management
Application Security
Computer Systems for Laboratories
Marcelo Cabezón, Graduate in Systems, Operational Researcher and Scientific at Ampersand Sistemas
-
Data Privacy Management
Three Key Trends That Will Change How You Secure Your Data
João Labre, Modern Work & Security Director at Beyondsoft Brazil
-
Biometric
Key Security Challenges in Coworking Spaces
Helga Moreno, Marketing at andcards
-
Data Breach Notification
Mapping the Terrain: The Staged Odyssey of Data Protection
Graham Hosking, Solutions Director - Compliance at Quorum Cyber
-
Cloud Security
Strengthen your company’s digital defenses in a world besieged by cybercriminals
Antonio Muñoz, CEO at Zepo
-
Application Security
Navigating Regulatory Compliance Does Not Have to Impair Business Growth
By Roy Matalon leads governance, risk management, and compliance at Cato Networks
-
Business Continuity Management
Data Backup, the New Responsibility for CISOs?
By Teresa Robinson, Editor at GRC Viewpoint
-
Application Security
Why Every Organisation Needs Cyber Defence in Depth
By Alan Calder, Founder and Chief Executive Officer, GRC International Group and IT Governance
-
Cyber Security
Backup and Storage Sector Gaining Huge Significance in the Current Cyber World
By Teresa Robinson, Editor at GRC Viewpoint
-
Confidentiality
“The Data”: What it really is and why it’s still unprotected
By Brian Christian, CEO, Flying Cloud
-
Data Privacy Management
Protecting Personal Employee Data Helps Protect Company Data
By Ani Banerjee, Chief Human Resources Officer for KnowBe4
-
Data Privacy Management
Instagram and Facebook’s Encryption Plans Condemned by Crime Agencies
By Teresa Robinson, Editor at GRC Viewpoint
-
Access Control
Enterprises Find Major Changes Through Use of Digital Signature
By Teresa Robinson, Editor at GRC Viewpoint
-
Access Control
Digital Signature Market: Latest Trends
By Teresa Robinson, Editor at GRC Viewpoint
-
Data Privacy
8-Points to Validate Data Storage & Backup Security
By Doron Pinhas, Chief Technology Officer at Continuity
-
Data Privacy
Understanding Quantum Risk: The Threats Posed by Quantum Computing
By Leon Brown, Director of Product Marketing at Qrypt
-
Data Privacy Management
Four Ways Your Approach to Multi-Factor Authentication May Be Hurting Your Zero-Trust Security Strategy.
By Carla Roncato, Vice President of Identity at WatchGuard Technologies
-
Corporate Entity Management
What makes a good operational risk manager?
By Bea Stafford, CEO at 1RS
-
Application Security
Don’t Let Mobile App Compliance Violations Damage Your Business
By Brian Reed, Chief Mobility Officer at NowSecure
-
Corporate Entity Management
5 Key Advantages of Using a Next Generation Compliance Automation Platform
By Naveen Bisht, Founder and CEO, AKITRA INC.
-
Data Privacy
4 Misconceptions About Data Security & Amazon S3
By Ed Casmer, Founder and CTO at Cloud Storage Security
-
Access Control
Inadequate Cloud Security, A Critical Aspect of Unified Threat Management?
By Teresa Robinson, Editor at GRC Viewpoint
-
Access Management
Desktop Virtualization Requires A New Approach
By Teresa Robinson, Editor at GRC Viewpoint
-
Cyber Security
Log Analysis, What To Know in 2023?
By Teresa Robinson, Editor at GRC Viewpoint
-
Consent Management
Consent Mangement Service Market Trends
By Teresa Robinson, Editor at GRC Viewpoint
-
Access Control
InApp Protection -What To Know in 2023?
By Teresa Robinson, Editor at GRC Viewpoint
-
Data Privacy
ChatGPT Now May Contain Sensitive Data Fed By Employees, Security Fears Prominent
By Teresa Robinson, Editor at GRC Viewpoint
-
CISO
PETs or Privacy Enhancing Technologies Will Gain More Importance Than Ever in the Upcoming Years
By Teresa Robinson, Editor at GRC Viewpoint
-
Audit Management
Why Is Investigation Management Software Inevitable?
By Teresa Robinson, Editor at GRC Viewpoint
-
Confidentiality
Why the Year 2023 Is Significant for the Data Privacy Industry?
By Teresa Robinson, Editor at GRC Viewpoint
-
Top Picks
Insights
AI in Cybersecurity: The Role of Machine Learning in Transforming Threat Detection
News
UK Regtech Novatus Global Secures $40M for US Expansion
Email Threat Protection
EasyDMARC Plans Investment in Channel Expansion
Insights
Four Ways Innovative Technology Can Boost Sustainability in the Hospitality Sector
Insights
Using Safety Incentive Programs to Improve the Effectiveness of Workplace Training
Load more
MAGAZINE
❮
❯