Compliance

Compliance news, analysis, research, how-to, opinion, and video.

Mozilla reports user data leak from Bugzilla project

It's the second database exposure incident reported by the organization in a month...

Report: NSA built 'Google-like' search engine for metadata

ICReach sought to provide easy access to billions of pieces of communications metadata...


PCI DSS 3.0 compliance deadline approaches. Will it make any difference?

Security experts say the new standard for the Payment Card Industry will improve companies' chances of avoiding the kinds of catastrophic breaches that have plagued major retailers. But that's only if they remain in compliance all...

Healthcare organizations still too lax on security

Data breach at Community Health is symptom of broader problem, security experts say...

Tech pros in healthcare, retail and finance admit they are failing on data compliance

Not enough manpower and too much data growth...

jayrockefeller

Senator questions airlines' data privacy practices

Jay Rockefeller raises concerns about airlines collecting and sharing personal information...

hospitalcorridor
In Depth

Security incidents tracked on Radar of Seattle Hospital

Software simplifies compliance with HIPAA rules...

medical 3

Community Health Systems blames China for recent data breach

Community Hospital Systems (CHS), which operates just over 200 hospitals in 29 states, reported a data breach impacting about 4.5 million people on Monday. The incident, blamed on actors in China, was made public via an 8-K filing...

China's Xiaomi faces privacy hurdles ahead of international expansion

Xiaomi apologized on Sunday for causing privacy concerns related to its phones...

In a hyper-social world, some seek a little privacy

People are getting more selective about what they want to share, and online firms are picking up on it...

Privacy groups call for action to stop Facebook's off site user tracking plans

Authorities should act immediately to stop this new vast expansion of Facebook's data collection and user profiling, privacy groups said...

Dutch spy agencies can receive NSA data, court rules

Because raw data is shared in bulk, less stringent privacy safeguards apply, the court said...

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem...

US court says warrant for access to all content of email account is justified

The government was granted a warrant to obtain emails and other information from a Gmail account...

binary hard drive

CryptoWall blamed for possible data breach at Benjamin F. Edwards & Co.

Warning of a potential data breach, Benjamin F. Edwards & Co. (BFE) says that CryptoWall, a variant of CryptoLocker, infected an employee's computer on May 27....

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private...

Chaos Computer Club bolsters NSA spying complaint with Tor snooping evidence

The Chaos Computer Club wants new evidence to prompt an investigation into mass surveillance of German citizens...

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

EA dismisses claim its Origin software spies on users

A screenshot posted on Reddit does not represent information collected by Origin, an EA spokeswoman said...

There's still a security disconnect on BYOD

Companies are implementing BYOD security policies, but surveys find that many workers aren't following them...

Load More