Regulation

Regulation | News, how-tos, features, reviews, and videos

things to do sign list deadlines

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...

vulnerable gdpr breach security cyber attack

Does GDPR compliance reduce breach risk?

A new report from Cisco suggests that GDPR compliance reduces data breach impact. Incident response, legal and security experts agree but caution not to rely on compliance alone.

2 industrial iot utility nuclear plant power plant

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

capitol dome congress

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

6 regulations

2 critical ways regulations and frameworks weaken cybersecurity

Security regulations and frameworks are good and necessary, but they can be inflexible and draw focus away from the most significant security risks.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

medical records 155235444

Gwinnett Medical Center investigating possible data breach

After being contacted by Salted Hash about a possible data breach, Gwinnett Medical Center, a not-for-profit network of healthcare providers in Gwinnett County, Georgia, has confirmed they're investigating what the healthcare provider...

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Open banking is coming to the U.S.: How secure will it be?

To protect customer data, open banking regulations in the U.S. must have teeth and enforcement.

creepy teacher chalkboard wolf

Complying with emerging privacy regulations: sometimes you need a silver cannonball

With GDPR compliance and other privacy regulations around the world in 2018, no small, simple solution exists.

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

binary neural network - artificial intelligence - machine learning

Balancing cybersecurity and regulatory compliance

Leveraging artificial intelligence and other advancements is key to protecting critical infrastructure.

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

ocean surf millimeter wave wireless technology sound waves abstract audio graphic

The rolling tide that is GDPR … say hello to the CCPA

Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

california on map of western usa 97656788

Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

Discussing the California Consumer Privacy Act of 2018, which covers businesses that collect or sell information about California residents. Some view it as the General Data Protection Regulation 2.0.

sacramento california state house

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

gdpr

GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe...

Load More
You Might Also Like