IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

PCI 3.0 and VISA in 2015

Live Webcast!             Join our expert roundtable as we give some tips to prepare for PCI DSS 3.0 and…

Click on the slide!

Securing Payments in 2015

Live Webcast!             Join us as we explain how to implement EMV, End-to-end encryption (E2EE), and Tokenization.

Click on the slide!

Guidelines for Hadoop Security

On-Demand               Play now and learn the top guidelines for Hadoop Security and Governance in…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
Everyone's Blog Posts - GlobalRisk community


  • Don't Believe These 6 Mobile Security Myths

    Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.

    1. “Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand…


  • The Relationship and Difference between Probability and Risk

    When we talk about probability and risk as they relate to healthcare they are two terms that often get confused and misused. In November 2014 I attended a National Press Club luncheon featuring Anthony Fauci, M.D., director of the National Institute of Allergy and Infectious Diseases (NIAID).[1] I…



  • Feds warn of more Online Predators

    What goes on in the home life of a 14-year-old girl such that she feels there’s nothing better to do than send nude photos of herself to a man whom she’s been corresponding with online? Though this goes well-beyond the parents not bothering to find out what their kids do online, another huge issue is the proliferation of online predators.

    And for parents who DO care enough to monitor their kids’ cyber activities, here’s some unsettling news: A 2013 survey called  …



  • Fingerprint hacked by a Photo

    You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.

    How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could happen at an annual meeting of hackers called the Chaos Communication Congress, says an article at thegardian.com. His “victim” was defense minister Ursula von der…



  • How to Choose ERM and GRC Software: SaaS vs On-Premise?

    One of the most frequently cited differences between Software-as-a-Service (SaaS) and On-Premise installations is the degree of flexibility between each type of solution. With SaaS solutions on the rise for GRC and Risk Management Software, more and more organizations are realizing that everything they thought they understood…



  • Some of the Best Thoughts of Nelson Mandela and my Interpretation of Them: Lessons for World Leaders

    1. Death is something inevitable. When a man has done what he considers to be his duty to his people and his country, he can rest in peace. I think I have made that effort and that, therefore, I will sleep for eternity.

    Lessons: Understand that being alive is an opportunity to celebrate the divine within us and therefore the divine in others. The main duty of a human being is to recognize that for dignity and prosperity to be realized, peace should be felt first for it is…