Please turn on your JavaScript for this page to function normally.
arrows
A third-party’s perspective on third-party InfoSec risk management

More than ever, organizations are relying on third parties to streamline operations, scale their business, expand and leverage expertise, and reduce costs. In the complex and …

person
The biggest data security blind spot: Authorization

Too many people have access to company data they don’t need. Also, too many companies focus on authentication (verifying identity) as a security measure and overlook the …

network
Companies carry unquantified levels of risk due to current network security approaches

40% of senior cybersecurity decision makers effectively prioritize risks to Payment Card Industry Data Security Standard (PCI DSS) 4.0 compliance, according to Titania. The …

cloud
Navigating data classification in the era of extensive cloud adoption

Healthcare and financial services organizations have embraced cloud technology due to the ease of managing increasing volumes of data, according to Blancco. Cloud adoption has …

compliance
As regulations skyrocket, is compliance even possible anymore?

Let’s face it, security teams are only as good as the next problem they face. But why is keeping up so difficult? New/evolving requirements, lengthy/confusing acronyms, and …

endpoint protection
Endpoint security getting easier, but most organizations lack tool consolidation

IT and security teams are consolidating management and security functions to help better deliver new applications to end users, improve regulatory compliance, and reduce …

Bill Tolson
While governments pass privacy laws, companies struggle to change

Government agencies keep making new privacy rules while end users fall victim to malpractice and scams. Bill Tolson, VP of Compliance and eDiscovery at Archive360, has spent …

cloud
Short-staffed SOCs struggle to gain visibility into cloud activities

Enterprises have a limited number of analysts running their security operations centers (SOCs) and are deploying multiple tools in an attempt to address their cloud security …

money
As the anti-money laundering perimeter expands, who needs to be compliant, and how?

Anti-money laundering (AML) policies are getting stronger as countries crack down on any opportunity criminals might have to take advantage of services and resources to …

patch
The future of vulnerability management and patch compliance

IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and old methods to exploit network endpoints. But are …

Europe
EU cyber resilience regulation could translate into millions in fines

The EU Commission’s Cyber Resilience Act (CRA) is intended to close the digital fragmentation problem surrounding devices and systems with network connections – from …

payments
As legislation evolves, businesses need a firm understanding of secure payment options

Despite the constant evolution of the financial landscape, consumers are still prioritizing a seamless and safe payment journey above all else, according to PCI Pal. New …

Don't miss

Cybersecurity news