regulation

Most security pros admit to accidental internal breaches at their organization
44% percent of executives believe employees have erroneously exposed personally identifiable information (PII) or business-sensitive information using their company email …

What are the qualities of a good digital identity management program?
Growing consumer expectations, the breakdown of traditional “walls” and emerging technologies are making it hard for organizations to devise a successful digital identity …

Top compliance and risk management challenges for financial organizations
Notable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. …

Exploring the proper use of pseudonymisation related to personal data
In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …

The rise of continuous crowdsourced security testing for compliance
A large percentage of organizations and institutions are moving toward a rigorous, continuous testing model to ensure compliance, a Synack report reveals. As part of this …

Despite potential fines, GDPR compliance rate remains low
58% of surveyed businesses worldwide failed to address requests made from individuals seeking to obtain a copy of their personal data as required by GDPR within the one-month …

Cybersecurity regulation is not one-size-fits-all
Differences in cultural values have led some countries to tackle the spectre of cyberattacks with increased internet regulation, whilst others have taken a …

2019 experienced massive spate of crypto crimes, $4.4 billion to date
With only seven months left for nations to pass laws and virtual asset service providers (VASPs) to comply with the guidelines, the majority of cryptocurrency exchanges are …

Most businesses have yet to allocate a CCPA compliance budget
Only 15% of organizations report having a mature approach to data privacy, 59% have yet to allocate budget to CCPA compliance, and 58% are currently using or will look to …

Port cybersecurity: Safeguarding operations against cyber attacks
Port stakeholders are facing more and more cybersecurity challenges with the emergence of new threats, regulations and increased digitalization. Major incidents such as …

Growing complexity is driving operational changes to privacy programs
A majority of companies are adopting a single global data protection strategy to manage evolving privacy programs, and that managing the expanding ecosystem of third parties …

California IoT security law: What it means and why it matters
In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility