The GRC Hub

The GRC Hub

  • Home
  • GRC
  • Compliance
    • Standards
  • Risk Management
  • News
    • Security
  • Resources
  • Contact Us

Endpoint

News Security 

IBM CISO Perspective: Zero Trust Changes Security From Something You Do to Something You Have

November 19, 2020 jbiscaya 5 Views 0 Comments Data Protection, Endpoint, IT Security, Zero Trust

As the chief information security officer (CISO) for IBM, I’m often asked by peers and colleagues, “What do you think

Read more
News Security 

UEM tackles remote work: ‘2020 Gartner Magic Quadrant for Unified Endpoint Management Tools’

August 17, 2020 jbiscaya 7 Views 0 Comments Endpoint, Gartner Magic Quadrant, Mobile Security, remote workforce, Unified Endpoint Management (UEM)

As summer winds down, unified endpoint management (UEM) is starting to heat up. Gartner just introduced the 2020 Gartner Magic

Read more
News Risk Management Security 

Loving the Algorithm: User Risk Management and Good Security Hygiene

August 7, 2020 jbiscaya 5 Views 0 Comments Cloud Security, Endpoint, insider threat, Mobile Security, Risk Management, Security, Unified Endpoint Management (UEM)

User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would

Read more
News Security 

Endpoint Security Using AI & MITRE For Your Remote Workforce

August 6, 2020 jbiscaya 14 Views 0 Comments Endpoint, Endpoint Security, remote access, remote workforce, Threat Detection

As employees increasingly work remotely, it is more important than ever to maintain visibility and threat detection in a remote

Read more
automation Cloud News Security 

Build a Roadmap for Cyber Resilience

August 3, 2020 jbiscaya 8 Views 0 Comments Advanced Attacks, Advanced Threat Protection, Advanced Threats, automation, CISO, Cloud, cyber resilience, Cyber Resiliency, Cyber-Risk, Data Protection, Endpoint

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s

Read more
News Security 

Why Zero-Click Cyberthreats Should Be on Your Radar

July 2, 2020 jbiscaya 20 Views 0 Comments Advanced Malware, Application Security, Bluetooth, Cyberattacks, email, Endpoint, Endpoint Protection, Malware, Mobile Devices, Mobile Malware, Mobile Security, Mobile Threats, Security Awareness, Threat Management, Wi-Fi

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance

Read more
News Risk Management Security 

The Modern Workplace: Keeping Remote Workers Productive and Secure

June 30, 2020 jbiscaya 8 Views 0 Comments Bring-Your-Own-Device (BYOD), BYOD, Endpoint, Mobile Device Management (MDM), Mobile Security, Mobile Threat Management (MTM), Mobile Threats, Risk Management

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to

Read more
News Security 

Vulnerable Powerline Extenders Underline Lax IoT Security

June 25, 2020 jbiscaya 11 Views 0 Comments Application Security, Device Management, Distributed Denial-of-Service (DDoS) Attacks, Endpoint, IBM X-Force Research, IoT Security, Software & App Vulnerabilities, Threat Research, Vulnerabilty

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5

Read more
Cloud News Security 

Visibility and Threat Detection in a Remote Working World

June 24, 2020 jbiscaya 9 Views 0 Comments Chief Information Security Officer (CISO), CISO, Cloud, Endpoint, IBM QRadar SIEM, Malware, Security Information and Event Management (SIEM), Security Intelligence & Analytics, Security Operations Center (SOC), Threat Detection, Threat Hunting

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard

Read more
News Security 

An Apple a Day: Treating BYOD Pains with Apple User Enrollment

June 24, 2020 jbiscaya 6 Views 0 Comments Apple, Application Security, Bring-Your-Own-Device (BYOD), Endpoint, iOS, MaaS360, Mobile Security, Unified Endpoint Management (UEM), user enrollment

Even with workers returning to the office—it might be a trickle or a flood depending on the organization—the shift towards remote

Read more
  • ← Previous
  • Popular
  • Recent
GRCP Certification – What you need to know

GRCP Certification – What you need to know

October 29, 2018 jbiscaya
GRC Capability Model 3.0 – OCEG

GRC Capability Model 3.0 – OCEG

October 19, 2018 jbiscaya
ISO/IEC 25010

ISO/IEC 25010

April 9, 2018 jbiscaya
ASUS releases fix for Live Update tool abused in ShadowHammer attack

ASUS releases fix for Live Update tool abused in ShadowHammer attack

March 26, 2019 jbiscaya
This business intelligence and data analysis bundle is only $39.99

This business intelligence and data analysis bundle is only $39.99

January 25, 2021 jbiscaya
Data of BuyUcoin cryptocurrency exchange traders allegedly leaked online

Data of BuyUcoin cryptocurrency exchange traders allegedly leaked online

January 25, 2021 jbiscaya
SpaceX launches off more Starlink satellites as part of its first ride-sharing space service

SpaceX launches off more Starlink satellites as part of its first ride-sharing space service

January 25, 2021 jbiscaya

Why it’s time for the tech industry to stand by up and be counted on sustainability communication technology

January 25, 2021 jbiscaya

Download Now

Copyright © 2021 The GRC Hub. All rights reserved.
 Logo Header Menu
  • Home
  • GRC
  • Compliance
    • Standards
  • Risk Management
  • News
    • Security
  • Resources
  • Contact Us
  • Login
  • Register