Government news, analysis, research, how-to, opinion, and video.

1a bullet

Mandatory Breach Notification is not a silver bullet

Global experience demonstrates that a Notifiable Data Breach (NDB) regime does little to make organizations act to ensure ongoing information security. And with generous exemptions provided by the Australian NDB rules, data breaches,...

protection privacy security internet network lock

3 ways to make the most of GDPR

EU regulations provide an unprecedented opportunity to elevate cybersecurity as a business enabler.

vulnerable gdpr breach security cyber attack

GDPR keeping you up? There’s another monster hiding under the bed…

There’s another deadline in May that needs to be paid attention to – the NIS Directive.


Why the cybersecurity industry is failing government

One problem is that tech companies still try to force-fit their commercial applications into the federal space. But that's not the only issue...

keys to access solutions world in palm of hand

May the forces be with you: using IPaaS for IAM and GDPR

Getting your head around GDPR with some new tools of the trade.

Collage of US flag and government icons

U.S. companies could get badly burned by GDPR – here's how not to

Knowing how GDPR is different from the regulations your company is already complying with will help determine the gaps that exist between the two.

Unicorn GDPR IDC

6 steps for GDPR compliance

GDPR law applies to all companies that collect and process data belonging to European Union (EU) citizens. You have every reason to fear it because failure to comply will be costly.

Government building with greek columns

What trust and safety leaders need to know after Google, Facebook and Twitter Senate hearings

And how social platforms can overcome increased scrutiny and regulations.

cyber insurance primary2

NAIC Model Law passes

What the new insurance data security regulation means and mean and how it will impact the insurance sector.

digital europe circuit board barbed wire barrier obstacle thinkstock

Navigating the General Data Protection Regulation with data maps

Companies need to know their data to better protect it and comply with the General Data Protection Regulation (GDPR).

Post office box

Government entities remain vulnerable to insider threats

Recommendations on how the U.S. Postal Service and other government entities can improve cyber security.

170315 fbi 2

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.

build freelance tech worker team teambuilding

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team.

Election 2016 teaser - Electronic voting security for digital election data

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

Insuring cyber risk for government contractors

Insurance companies should understand the market opportunity for cyber insurance with government contractors.

5956775821 5ac6842f29 o

Britain’s eyes on the prize

Britain's new cybersecurity office is designed to partner with business to best protect the nation's digital interests.

Qatar skyline

Recap: News agency hack blamed for diplomatic meltdown in Qatar

Early Monday morning in Bahrain, the country's Foreign Affairs Ministry said the nation has severed diplomatic ties with Qatar. Within minutes of Bahrain's announcement, the United Arab Emirates, Saudi Arabia, and Egypt followed suit....

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

internet of things data

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT...

Load More