compliance
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
Illuminating the path: Compliance as the key to security-by-design
Like taxes or going to the dentist, compliance is one of those topics that people often don’t like to contemplate. There are many reasons for the distaste but this …
![Bill Tolson](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/15095910/bill_tolson_2-archive360-400x200.jpg)
Cloud compliance: Falling out of it could spell doom
In this Help Net Security interview, Bill Tolson, VP of Global Compliance and eDiscovery at Archive360, talks about the importance of cloud compliance and what companies can …
![template](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093222/template-400x200.jpg)
MVSP: A minimum cybersecurity baseline to simplify vendor security assessment
Any organization that’s actively working on managing its cybersecurity risk can’t ignore the risk that goes with third-party vendors having access to its critical …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103500/cube-400x200.jpg)
Regulation fatigue: A challenge to shift processes left
Recent high-profile supply chain attacks have heightened the need for increased regulation of the open-source community. In the U.S., for example, President Biden’s …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
When it comes to collaboration tools, firms struggle to keep up with security and compliance
Surveying 100 key executives across financial services, Theta Lake found that 83% of respondents are turning off key productivity and usability features of collaboration …
![hardware](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093707/hardware2-400x200.jpg)
How do I select a GRC solution for my business?
Selecting a governance, risk and compliance (GRC) solution can be very challenging. It must cover all three practices it stands for, without exception, which can sometimes be …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/21163930/microsoft365-city-400x200.jpg)
Microsoft launches Privacy Management for Microsoft 365
Microsoft has made available Privacy Management for Microsoft 365, a new AI-based solution to help enterprises manage data privacy risks and build a privacy resilient …
![road sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111958/road_sign-400x200.jpg)
Compliance does not equal security
Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not …
![Data](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/07091136/data_1-400x200.jpg)
Database monitoring tools usage skyrocketing
79% of database professionals are now using either paid-for or in-house monitoring tools, a survey from Redgate Software has shown. This is an increase of 10 percentage points …
![Zack Hutto](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/01111043/zack_hutto_2-gartner-400x200.jpg)
Which technologies can help legal and compliance teams navigate a changing landscape of risk?
In this interview with Help Net Security, Zack Hutto, Director of Advisory Services at Gartner‘s Legal and Compliance Practice, talks about the challenges legal and …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
Organizations putting security and compliance at the forefront to strengthen trust perceptions
Organizations are more frequently embedding trust metrics into their request for proposals (RFPs) to ensure that potential vendors can also be trusted ecosystem partners. …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
Three areas legal leaders should focus their technology efforts in
As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints