Compliance

Compliance news, analysis, research, how-to, opinion, and video.

usb thumb flash drive stick
IoT, crime, investigation, forensics, privacy

europe data privacy rules primary2

U.S. companies spending millions to satisfy Europe's GDPR

PwC says CIOs are allocating millions of dollars from their budgets to accommodate the Europe’s General Data Protection Regulation, which will require U.S. companies to meet stringent data privacy rules in 2018.

blame 174280704

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

SIMposium 2016

CIO confab SIMposium to skip 2017, return in 2018 as SIM Connect Live

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.

0 regulated

7 cybersecurity best practices that regulated industries deal with

Whether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity....

data protection

What is the General Data Protection Regulation and why should you care?

Find out how to prepare for new EU legislation on data collection and data protection.

fog visibility island

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.

cloud map

What’s behind Amazon, Microsoft and Google’s aggressive cloud expansions

In the first week of October, Amazon Web Services, Microsoft Azure and Google Cloud Platform all announced plans to build out new regions for their IaaS cloud operations. The new regions add to an already impressive roster of data...

security log monitoring

5 tools for making sense of system logs

Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm.

security group team circuitry

Beyond logging: Using SIEM to combat security, compliance issues

Perimeter security simply isn't enough anymore. We need a holistic view of our IT infrastructures; SIEM provides that.

gottfried leibbrandt ceo swift sibos 2016

Swift CEO reveals three more failed attacks on banking network

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.

02 bank teller

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal

hpe hewlett packard enterprise palo alto headquarters office

Plan now for the EU's privacy regulation revolution, says HPE exec

The cost of complying with the European Union's General Data Protection Regulation might seem like something best deferred until it enters force in 2018 -- but working on compliance could boost profit, not reduce it, say some vendors....

protecting data

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them.

corporate meeting teamwork collaboration

Newly public Twilio moves up the food chain

Twilio's enterprise plan addresses enterprise application development needs such as security, compliance and administration control.

misunderstood contracts disagreement argue blame

5 commonly misunderstood compliance terms

Understanding the terms is critical given the complexity of compliance, and will help you when analyzing the best technology solutions to manage compliance as a whole

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

information security

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

healthcare data breach ts

New HIPAA guidance addresses ransomware

The U.S. Department of Human Services has released new guidance for health care companies that focuses on the growing threat of ransomware, stresses the need for better education and regular backups, and confirms that a ransomware...

Load More