Tag "Security Compliance"

Back to homepage
Hardware/Network IT Compliance

Regulations are driving innovation toward an identity layer on the Internet

The security community often points to the inherent lack of an encryption layer on the Internet as a factor behind many of the related threat vectors. The decentralized nature of

IT Compliance

How to navigate critical data security and privacy policy challenges

By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for

Software

The Future of Passwords

There’s an old Popeye cartoon where the famous sailor with massive forearms stands outside a cave that’s blocked by a giant boulder, and he yells, “Open Says-Me.” “Open sesame” wordplay

IT Compliance

India to unveil cyber security strategy policy in January

India will release the cyber security strategy policy in January next year to enable the government to “cyber-secure the nation”, which will also help in achieving the target to achieve

Expert Articles Industry Insights

How can Data Security Unlock Open Banking for Consumers

By David Smith, Consultant at Cardzgroup, The revised Payment Services Directive (PSD2) adopted in October 2015, by the European Union aims to promote the concept of open banking in the

IT Compliance

When will the GDPR pot boil over? It’s sooner (and different) than you think

There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the

IT Compliance

Compliance Is Not Security: Why You Need Cybersecurity Chops In The Boardroom

Cybersecurity is now a topic of discussion in every boardroom. A diligent director takes this risk, and their fiduciary duty around it, seriously. But the risk is complex and technical,

Industry Insights

Fitting cybersecurity frameworks into your security strategy

Whatever an organization’s culture, effective use of a security framework requires understanding business goals and program metrics, and demands leadership communication. The development of new cybersecurity frameworks has increased dramatically

Cloud

Hyperfocused Security for the Cloud

The cloud is the future and the future has arrived. Gartner predicts the worldwide public cloud service market will grow from $182.4 billion in 2018 to $331.2 billion in 2022,

Expert Articles Network Security

How to establish insider threat programmes and conduct investigations

By Josh Lefkowitz – CEO at FlashPoint, Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are