Items Tagged with "Compliance"
Think GDPR Won’t Affect Your U.S. Company? Guess Again
February 07, 2018 Added by:Ken Spinner
Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.
Comments (0)
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
December 22, 2017 Added by:Sanjay Kalra
Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.
Comments (0)
Why the GDPR is Important to Your Organization
August 14, 2017 Added by:Steve Durbin
The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.
Comments (0)
4 Things that Make Cloud Compliance Harder Than You Think
April 06, 2017 Added by:John Martinez
There are some factors to take into consideration that may make compliance in the cloud a bit more challenging
Comments (0)
GRC: Going Beyond the Acronym
March 10, 2017 Added by:Corey Wilburn
An effective GRC disciple requires a company-wide buy-in. The easier you make it for your colleagues, the easier you make it for yourself.
Comments (0)
Why Security Compliance Is a Continuous Process, and Not Just a Check in the Box!
November 18, 2016 Added by:Tim Prendergast
In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.
Comments (0)
Compliance Capabilities: Audit Achievement through Access Management
August 17, 2016 Added by:Dean Wiech
Overall, audits can be a huge headache for organizations and their leaders, but identity and access governance technology can reduce the audit scramble while also providing many additional benefits.
Comments (0)
Getting Your Records GDPR-Ready
August 11, 2016 Added by:Gavin Siggers
The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.
Comments (0)
Security Is from Mars, Application Delivery Is from Venus
July 14, 2016 Added by:Nimmy Reichenberg
Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.
Comments (0)
Key Risk Management Issues For 2016
January 13, 2016 Added by:InfosecIsland News
Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.
Comments (0)
Why Creating Automated User Provisioning Workflows is Important
December 01, 2015 Added by:Identropy
User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.
Comments (0)
Webcast: Enterprise Security Trends To Watch For In 2015
February 12, 2015 Added by:InfosecIsland News
Please join Virtustream and SecurityWeek on Wednesday, Feb. 18th at 1PM ET for a live webcast on enterprise security trends.
Comments (4)
Three Compliance Trends to Watch in 2015
January 26, 2015 Added by:Mav Turner
Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.
Comments (2)
What is Continuous Compliance and Assurance?
June 18, 2014 Added by:Jon Long
The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.
Comments (0)
Five Ways to Avoid HIPAA Compliance Breaches With Better Security Controls
June 05, 2014 Added by:InfosecIsland News
To prevent costly breaches such as this one from happening, Netwrix Corporation suggests the following best practices every health care organization or insurance provider should implement and maintain to ensure HIPAA compliance.
Comments (0)
What’s New in PCI DSS v3.0 for Penetration Testing?
May 20, 2014 Added by:Nima Dezhkam
As a main area of our interest, PCI v3.0 enhances the Penetration Testing requirement by adding guidelines that help both the organizations and the auditors to better show and understand two important areas of concern in every PCI compliance effort.