Blog Posts Tagged with "Compliance"


Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)


Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)


Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)


4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)


GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)


Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!

November 18, 2016 Added by:Tim Prendergast

In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.

Comments  (0)


Compliance Capabilities: Audit Achievement through Access Management

August 17, 2016 Added by:Dean Wiech

Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.

Comments  (0)


Getting Your Records GDPR-Ready

August 11, 2016 Added by:Gavin Siggers

The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.

Comments  (0)


Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)


Key Risk Management Issues For 2016

January 13, 2016 Added by:InfosecIsland News

Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.

Comments  (0)


Why Creating Automated User Provisioning Workflows is Important

December 01, 2015 Added by:Identropy

User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.

Comments  (0)


Webcast: Enterprise Security Trends To Watch For In 2015

February 12, 2015 Added by:InfosecIsland News

Please join Virtustream and SecurityWeek on Wednesday, Feb. 18th at 1PM ET for a live webcast on enterprise security trends.

Comments  (4)


Three Compliance Trends to Watch in 2015

January 26, 2015 Added by:Mav Turner

Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.

Comments  (2)


What is Continuous Compliance and Assurance?

June 18, 2014 Added by:Jon Long

The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.

Comments  (0)


Five Ways to Avoid HIPAA Compliance Breaches With Better Security Controls

June 05, 2014 Added by:InfosecIsland News

To prevent costly breaches such as this one from happening, Netwrix Corporation suggests the following best practices every health care organization or insurance provider should implement and maintain to ensure HIPAA compliance.

Comments  (0)


What’s New in PCI DSS v3.0 for Penetration Testing?

May 20, 2014 Added by:Nima Dezhkam

As a main area of our interest, PCI v3.0 enhances the Penetration Testing requirement by adding guidelines that help both the organizations and the auditors to better show and understand two important areas of concern in every PCI compliance effort.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked