compliance
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
How to avoid security blind spots when logging and monitoring
Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the …
![consumer](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105245/consumer-400x200.jpg)
Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements
CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094016/drown-400x200.jpg)
How to avoid compliance leader burnout
There has been a lot of talk about the sharp increase in workplace burnout. The WHO defines burnout as a syndrome resulting from chronic workplace stress that has not been …
![Simon Winchester](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/12115032/simon_winchester_2-jumio-400x200.jpg)
The changing role of the CCO: Champion of innovation and business continuity
In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
Independent security audits are essential for cloud service providers. Here’s why
As more companies outsource IT infrastructure to third-party providers and adopt cloud-based collaboration tools, the need for partners that deliver strong protection and …
![fist](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093104/fist-400x200.jpg)
How to achieve better cybersecurity assurances and improve cyber hygiene
How can your business reduce the risk of a successful cyber attack and create a defendable network? It’s best to start with the three don’ts: Don’t believe that network …
![Keeper Compliance Reports](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/05101521/keeper_security-cr-400x200.jpg)
Keeper Compliance Reports
In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101103/data-400x200.jpg)
The challenges of consumer data and PII usage
In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …
![VR](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/27131224/future-vr-400x200.jpg)
Is IT ready for the metaverse? If not, it should be
Info-Tech Research Group has released a research to help IT departments identify risks in deploying metaverse solutions and how to mitigate them. This new research explores …
![IoT security](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110405/iot-security-400x200.jpg)
Where should companies start when it comes to device security?
The Internet of Things (IoT) market has a security problem that is boiling over into a business issue. According to a recent survey conducted by the Ponemon Institute, 59% of …
![apple](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104350/apple-400x200.jpg)
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Cloud-native adoption shifts security responsibility across teams
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play