Blog Posts Tagged with "Compliance"

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

21ebb461b9add7173e8e69f62ef440b4

When a Regulators’ Visit Can Be the Least of Your Worries

August 28, 2018 Added by:Jesse Canada

Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance.

Comments  (0)

23cdc45f8cc85a3009e56cf5bd89a095

Plug Your Cloud Cybersecurity Holes

July 26, 2018 Added by:Marie Hattar

Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.

Comments  (0)

377a54ee089b6809e8e68d75d28614cb

Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

C33ba283f54a267b479325c67e2ea466

4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)

D39e8a0d81c2a146f879631550fb065b

GRC: Going Beyond the Acronym

March 10, 2017 Added by:Corey Wilburn

An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.

Comments  (0)

74a3faa048e151b7a9b61267399d79e3

Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!

November 18, 2016 Added by:Tim Prendergast

In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Compliance Capabilities: Audit Achievement through Access Management

August 17, 2016 Added by:Dean Wiech

Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.

Comments  (0)

D8cfa4fbaaebcf97800b91c2c7dedd5d

Getting Your Records GDPR-Ready

August 11, 2016 Added by:Gavin Siggers

The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Key Risk Management Issues For 2016

January 13, 2016 Added by:InfosecIsland News

Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Why Creating Automated User Provisioning Workflows is Important

December 01, 2015 Added by:Identropy

User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Enterprise Security Trends To Watch For In 2015

February 12, 2015 Added by:InfosecIsland News

Please join Virtustream and SecurityWeek on Wednesday, Feb. 18th at 1PM ET for a live webcast on enterprise security trends.

Comments  (4)

E6258b956c06d8dbabbde10d4919e5ef

Three Compliance Trends to Watch in 2015

January 26, 2015 Added by:Mav Turner

Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »