Regulation

Regulation | News, how-tos, features, reviews, and videos

EU / European Union / GDPR data privacy, regulation, compliance
California Consumer Privacy Act  / CCPA  >  State flag / secured data

financ credit pos

What is PSD2? And how it will impact the payments processing industry

The EU’s revised Payment Services Directive (PSD2), which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.

GDPR data privacy / data protection / security / risk management

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

collage of US government icons

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing?

The U.S. Capitol building in Washington

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

Hands write on paper with pen.

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations.

compliance compliant regulation rules stamp gdpr

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

things to do sign list deadlines

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...

vulnerable gdpr breach security cyber attack

Does GDPR compliance reduce breach risk?

A new report from Cisco suggests that GDPR compliance reduces data breach impact. Incident response, legal and security experts agree but caution not to rely on compliance alone.

2 industrial iot utility nuclear plant power plant

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

capitol dome congress

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

6 regulations

2 critical ways regulations and frameworks weaken cybersecurity

Security regulations and frameworks are good and necessary, but they can be inflexible and draw focus away from the most significant security risks.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

Load More
You Might Also Like