Blog Posts Tagged with "Compliance"
Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors
April 07, 2020 Added by:Steve Durbin
Marriott International has experienced their second data breach
Comments (0)
Variations in State Data Breach Disclosure Laws Complicate Compliance
September 26, 2018 Added by:John Moran
New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.
Comments (0)
The Importance and Requirements of Privileged Access Management
August 30, 2018 Added by:Joseph Carson
The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.
Comments (0)
When a Regulators’ Visit Can Be the Least of Your Worries
August 28, 2018 Added by:Jesse Canada
Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance.
Comments (0)
Plug Your Cloud Cybersecurity Holes
July 26, 2018 Added by:Marie Hattar
Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.
Comments (0)
Think GDPR Won’t Affect Your U.S. Company? Guess Again
February 07, 2018 Added by:Ken Spinner
Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.
Comments (0)
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
December 22, 2017 Added by:Sanjay Kalra
Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.
Comments (0)
Why the GDPR is Important to Your Organization
August 14, 2017 Added by:Steve Durbin
The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.
Comments (0)
4 Things that Make Cloud Compliance Harder Than You Think
April 06, 2017 Added by:John Martinez
There are some factors to take into consideration that may make compliance in the cloud a bit more challenging
Comments (0)
GRC: Going Beyond the Acronym
March 10, 2017 Added by:Corey Wilburn
An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.
Comments (0)
Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!
November 18, 2016 Added by:Tim Prendergast
In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.
Comments (0)
Compliance Capabilities: Audit Achievement through Access Management
August 17, 2016 Added by:Dean Wiech
Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.
Comments (0)
Getting Your Records GDPR-Ready
August 11, 2016 Added by:Gavin Siggers
The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.
Comments (0)
Security Is from Mars, Application Delivery Is from Venus
July 14, 2016 Added by:Nimmy Reichenberg
Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.
Comments (0)
Key Risk Management Issues For 2016
January 13, 2016 Added by:InfosecIsland News
Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.
Comments (0)
Why Creating Automated User Provisioning Workflows is Important
December 01, 2015 Added by:Identropy
User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider