Regulation

Regulation | News, how-tos, features, reviews, and videos

capitol dome congress
01 intro prediction

6 regulations

2 critical ways regulations and frameworks weaken cybersecurity

Security regulations and frameworks are good and necessary, but they can be inflexible and draw focus away from the most significant security risks.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

medical records 155235444

Gwinnett Medical Center investigating possible data breach

After being contacted by Salted Hash about a possible data breach, Gwinnett Medical Center, a not-for-profit network of healthcare providers in Gwinnett County, Georgia, has confirmed they're investigating what the healthcare provider...

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Open banking is coming to the U.S.: How secure will it be?

To protect customer data, open banking regulations in the U.S. must have teeth and enforcement.

creepy teacher chalkboard wolf

Complying with emerging privacy regulations: sometimes you need a silver cannonball

With GDPR compliance and other privacy regulations around the world in 2018, no small, simple solution exists.

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

binary neural network - artificial intelligence - machine learning

Balancing cybersecurity and regulatory compliance

Leveraging artificial intelligence and other advancements is key to protecting critical infrastructure.

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

ocean surf millimeter wave wireless technology sound waves abstract audio graphic

The rolling tide that is GDPR … say hello to the CCPA

Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

california on map of western usa 97656788

Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

Discussing the California Consumer Privacy Act of 2018, which covers businesses that collect or sell information about California residents. Some view it as the General Data Protection Regulation 2.0.

face superimposed on keyboard privacy hacker

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

audit binary compliance magnifying glass investigate

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

sacramento california state house

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

gdpr

GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe...

5 fumbling dumb mistake

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

Load More