Compliance

Compliance news, analysis, research, how-to, opinion, and video.

controlling privacy
owasp

trump govt employees twitter

We're all responsible for combating fake news

In the darkness of fake news and phishing, it’s our job to shed a little light and equip employees with the skills to navigate treacherous waters.

statue of liberty 359341

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.

mobile device management

Smackdown: Office 365 vs. G Suite management

Users don't directly see these capabilities, but they are core to managing your productivity and collaboration platform

10 phishing

How to avoid falling for the W-2 phishing scam

The W-2 scam provides another example of how a security awareness program that adapts to trending threats has an advantage over a one-size-fits-all plan.

ibm watson health

Texas hospital struggles to make IBM's Watson cure cancer

If IBM is looking for a new application for its Watson machine learning tools, it might consider putting health care providers' procurement and systems integration woes ahead of curing cancer.

Microsoft Store in Colorado

Microsoft may owe you $100 if you bought from the Microsoft Store

Microsoft settled a class-action lawsuit for leaking too much information about customers who purchased items from Microsoft Store outlets.

times square new york

New financial regulations go into effect in New York

On March 1, new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the...

usb thumb flash drive stick

Reaching the cybersecurity tipping point

Are you creating conditions that lead employees toward their cybersecurity tipping point—to committing to solid security and privacy practices?

IoT, crime, investigation, forensics, privacy

IoT in crime prevention: Balancing justice with privacy

Issues of privacy increase as IoT sensors collect more information about us and criminal investigators seek to use that data as evidence,

europe data privacy rules primary2

U.S. companies spending millions to satisfy Europe's GDPR

PwC says CIOs are allocating millions of dollars from their budgets to accommodate the Europe’s General Data Protection Regulation, which will require U.S. companies to meet stringent data privacy rules in 2018.

blame 174280704

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

SIMposium 2016

CIO confab SIMposium to skip 2017, return in 2018 as SIM Connect Live

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.

0 regulated

7 cybersecurity best practices that regulated industries deal with

Whether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity....

data protection

What is the General Data Protection Regulation and why should you care?

Find out how to prepare for new EU legislation on data collection and data protection.

fog visibility island

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.

cloud map

What’s behind Amazon, Microsoft and Google’s aggressive cloud expansions

In the first week of October, Amazon Web Services, Microsoft Azure and Google Cloud Platform all announced plans to build out new regions for their IaaS cloud operations. The new regions add to an already impressive roster of data...

security log monitoring

5 tools for making sense of system logs

Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm.

security group team circuitry

Beyond logging: Using SIEM to combat security, compliance issues

Perimeter security simply isn't enough anymore. We need a holistic view of our IT infrastructures; SIEM provides that.

Load More