compliance
Five ways to avoid costly compliance risks
When it comes to violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules, the stakes can be high. Recently, the New York …
Secure file sharing uncovered
Ahmet Tuncay is the CEO of Soonr, a provider of secure file sharing and collaboration services. In this interview he talks about making security a priority, discusses what …
Most compliance officers play little role in cyber security
Seventy-five percent of compliance officers are not involved in managing cyber security risk according to a report from Kroll and Compliance Week. In a survey of senior-level …
Calling the cloud: Challenges of managing information
The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …
EU Data Protection Regulation: Detection is the best prevention
The UK government recently published guidelines for companies covering the five basic controls that businesses must follow to ensure a minimum level of protection. The goal of …
Tips for utilities to comply with new cybersecurity standards
When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …
ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
Guide to the UK government cyber essentials scheme
The results of the latest cyber threat reports and surveys have denominated 2013 as the year of major breaches. The media naturally focuses on the big stories of massive data …
Sophos Cloud manages Windows, Mac and mobile devices
At Infosecurity Europe 2014, Sophos announced the latest version of Sophos Cloud, the company’s cloud-based solution for small- and mid-sized organisations seeking a …
Working to accomplish compliance and security
Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …
A guide to cloud encryption and tokenization
Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there’s a …
Compliance is no guarantee of security
The regulatory landscape is constantly evolving. For example tougher new EU data protection laws are scheduled to come into effect over the next year or two. These new …