Compliance

Compliance | News, how-tos, features, reviews, and videos

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im
smart city - wireless mobile network

A military meeting with civilians.

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base, which includes over 300,000 companies in the supply chain.

FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.

A woman and a man have a conversation while holding a notebook and pen, coffee and a mobile tablet.

How CISOs and data privacy officers should work together

Close collaboration between CISOs and DPOs can benefit both roles in their efforts to better understand, align with and protect the business.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

backdoor / abstract security circuits, locks and data blocks

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say.

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

credit card hack financial breach stealing money traffiking financial data target by igphotography

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either...

gavel / money

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Two FCA cases unsealed in 2019 show that contractors can face multi-million-dollar penalties if they don't comply with federal government cybersecurity requirements.

CCPA | California Consumer Privacy Act  >  Satellite view of California's network of lights / lock

9 CCPA questions every CISO should be prepared to answer

Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to these questions.

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

An armored knight armor with halo and wings holds a shield, layered in Microsoft brand colors.

How to use Microsoft Compliance Score to improve data protection

The new Compliance Score console in Microsoft 365 offers templates and advice to help meet the ever-growing list of regulatory data protection and privacy rules.

U.S. + U.K. flags merged with binary code overlay  >  US CLOUD Act / UK COPOA Act

What you need to know about the US CLOUD Act and the UK COPOA Act

A new data access agreement between the UK and US streamlines law enforcement’s ability to gain access to data held on foreign soil.

A binary map of china.

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned?

A woman carefully studying survey data.

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices.

GDPR data privacy / protection / regulation / security / compliance / documentation / data / records

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

financ credit pos

What is PSD2? And how it will impact the payments processing industry

The EU’s revised Payment Services Directive (PSD2), which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.

Load More
You Might Also Like