IT Operations
IT Operations | News, how-tos, features, reviews, and videos
How strong, flexible data protection controls can help maintain regulatory compliance
An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
The future of work: Coming sooner than you think
What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.
CSO's ultimate guide to security and privacy laws, regulations, and compliance
This handy directory provides summaries and links to the full text of each security or privacy law and regulation.
HIPAA explained: definition, compliance, and violations
This landmark law imposes stringent privacy and security mandates on health care providers—and most of their IT vendors.
SolarWinds hack is quickly reshaping Congress’s cybersecurity agenda
More cybersecurity funding for states and Capitol, new breach reporting rules, and ransomware-related bills will likely be on the agenda for the 117th Congress.
US bulk energy providers must now report attempted breaches
US bulk energy providers must now report attempted breaches as well as successful breaches. Guidance is murky over what constitutes an "attempted" breach.
CPRA explained: New California privacy law ramps up restrictions on data use
The California Privacy Rights Act (CPRA) is a new law that toughens some data security requirements, brings California more in line with Europe's General Data Protection Regulation, and creates a new state agency—the California...
Privacy, data protection regulations clamp down on biometrics use
The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication.
New AI privacy, security regulations likely coming with pending federal, state bills
CISOs should prepare for new requirements to protect data collected for and generated by artificial intelligence algorithms.
EU's DORA regulation explained: New risk management requirements for financial firms
The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.
Defining data protection standards could be a hot topic in state legislation in 2021
Some states could follow the New York Shield Act’s lead and set clearer regulatory expectations for reasonable cybersecurity. Election security legislation likely not on the agenda.
Passage of California privacy act could spur similar new regulations in other states
Voters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.
US Treasury Department ban on ransomware payments puts victims in tough position
The Treasury Department's advisory warns companies not to pay ransoms to sanctioned entities. The move complicates ransomware incident response and might encourage insurance carriers to drop ransomware coverage.
Avoiding the snags and snares in data breach reporting: What CISOs need to know
Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.
Uber breach case a ‘watershed moment’ for CISOs’ liability risk
An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.
CMMC bakes security into DoD’s supply chain, has value for all businesses
The Cybersecurity Maturity Model Certification provides a means for the DoD to certify the security capabilities of its contractors, but it's a good way to assess the cybersecurity maturity for all companies.
Homomorphic encryption: Deriving analytics and insights from encrypted data
Homomorphic encryption allows safe outsourcing of storage of computation on sensitive data to the cloud, but there are trade-offs with performance, protection and utility.
With cloud's security benefits comes systemic risks, report finds
A new report from the Carnegie Endowment for International Peace seeks to give law and policy makers a better understanding of cloud security risks.
-
Video/Webcast
Sponsored -
eBook
Sponsored -
Sponsor Article
Sponsored -
White Paper
-
Solution Brief
Sponsored