Compliance

Compliance | News, how-tos, features, reviews, and videos

rules procedures manuals one way signs

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

globe

Why Africa’s private sector should be concerned about more than the GDPR

The European Union General Data Protection Regulation (GDPR) has generated strong interest in Africa’s private sector. However, the bigger picture shows massive gaps across Africa’s data privacy landscape. This article highlights some...

MyHeritage HQ

92 million MyHeritage email addresses found on private server

On Monday, MyHeritage, an online genealogy platform, announced that more than 90 million of their users had email addresses and hashed passwords compromised, after a researcher discovered a file being hosted on a private server.

mobile security / unlocked data connections

Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when screening for compliance. How do you protect your organization, your clients and your...

Government building with greek columns

How GDPR impacts US cybersecurity policy

With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

vulnerable gdpr breach security cyber attack

GDPR is here – now what?

Look at the General Data Protection Regulation (GDPR) and the revised Payment Services Directive (PSD2) as opportunities to adopting sound data protection practices.

Android Smart Lock Trusted Places

Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance

With the finable GDPR compliance deadline just weeks away, the vultures are circling – and leading the pack is a group of companies touting so-called ‘cyber insurance’. While the majority of IT security vendors are opting to scare...

vulnerable gdpr breach security cyber attack

Salted Hash Ep 28: GDPR deadline fast approaches

The deadline for the General Data Protection Regulation (GDPR) is almost here. During our trip to the RSA Conference last month, Salted Hash spoke to an expert on the subject, and learned some interesting things when it comes to...

11 regulations

What small business owners should know about GDPR and why

The General Data Protection Regulation (GDPR) goes into force May 25, 2018. Learn what small-business owners need to know about GDPR and why it matters.

11 regulations

Why mid-market companies face a tougher road with the GDPR

The rules and potential penalties of the GDPR will not fit all sized companies.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

supply chain

DOD releases new guidance to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules...

vulnerable gdpr breach security cyber attack

GDPR-defined personal data can be hard to find—here's where to look

The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked.

businessman with stress headache pain frustration

Going through the 7 stages of GDPR

How to cope with the pain and distress of compliance to the new General Data Protection Regulation (GDPR).

vulnerable gdpr breach security cyber attack

GDPR compliance in a nutshell

Time to figure out how to manage your enterprise's compliance with the General Data Protection Regulation (GDPR).

European Union, EU

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

marionette social engineering

Social engineering: It's time to patch the human

Is there a patch for human stupidity? If you believe the common saying, there isn't. However, Jayson E. Street says there is, and it's time companies started patching their humans. The truth is, technology alone isn't going to save...

rules procedures manuals programming language

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a...

Load More