compliance

How to avoid security blind spots when logging and monitoring
Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the …

Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements
CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy …

How to avoid compliance leader burnout
There has been a lot of talk about the sharp increase in workplace burnout. The WHO defines burnout as a syndrome resulting from chronic workplace stress that has not been …

The changing role of the CCO: Champion of innovation and business continuity
In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …

Independent security audits are essential for cloud service providers. Here’s why
As more companies outsource IT infrastructure to third-party providers and adopt cloud-based collaboration tools, the need for partners that deliver strong protection and …

How to achieve better cybersecurity assurances and improve cyber hygiene
How can your business reduce the risk of a successful cyber attack and create a defendable network? It’s best to start with the three don’ts: Don’t believe that network …

Keeper Compliance Reports
In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper …

The challenges of consumer data and PII usage
In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and personally identifiable information (PII). As …

Is IT ready for the metaverse? If not, it should be
Info-Tech Research Group has released a research to help IT departments identify risks in deploying metaverse solutions and how to mitigate them. This new research explores …

Where should companies start when it comes to device security?
The Internet of Things (IoT) market has a security problem that is boiling over into a business issue. According to a recent survey conducted by the Ponemon Institute, 59% of …

How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

Cloud-native adoption shifts security responsibility across teams
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …