Features
Features
Assessing your regulatory compliance needs
-
CCPA compliance begins with data inventory assessment
In this SearchCIO Q&A, multiple experts sound off on major questions businesses have about CCPA compliance ahead of its January 2020 enforcement date. Continue Reading
-
Security, compliance standards help mitigate BIOS security vulnerabilities
Cybersecurity vulnerabilities associated with PCs often overlook BIOS. Read for strategies to offset these threats and for preventing unauthorized BIOS modifications. Continue Reading
-
Lacking data management processes holds back digital business
The business fallout of poor data management processes goes well beyond security and privacy implications. Evident IT CEO David Thomas explains in this SearchCompliance Q&A. Continue Reading
-
FAQ: How is digitization influencing SEC compliance priorities?
As online trading and digital finance becomes the norm, updated SEC compliance regulations target these transactions in an effort to improve digital asset security. Continue Reading
-
FAQ: How is the Privacy Shield Framework being enforced?
The FTC has issued its first enforcement actions for companies found in violation of the EU-U.S. Privacy Shield Framework, but are the rules doing enough to protect consumer data? Continue Reading
-
Is the CISO-CIO reporting structure hampering security?
Reassessing the CISO-CIO reporting structure could prove to be a vital step in boosting an organization's data protection strategy, according to cybersecurity expert Tarah Wheeler. Continue Reading
-
Book excerpt: Digital surveillance in the post-Snowden era
In this book excerpt, author Timothy Edgar explains how Edward Snowden's NSA leaks ushered in a new era for U.S. digital surveillance techniques and privacy protection. Continue Reading
-
Drone regulations evolve as enterprise adoption heats up
With enterprises embracing drone use to gain competitive advantage, the FAA is easing up on compliance rules targeting drones' use in commercial operations. In this Q&A, attorney Mark McKinnon discusses the evolution of drone regulations. Continue Reading
-
FAQ: How does EU GDPR compliance change data protection processes?
In this FAQ, learn how compliance with the EU's General Data Protection Regulation requires companies to rethink their data protection policies and processes. Continue Reading
-
Metrics vital to insider threat prevention and mitigation
Insider threat prevention has become inherent to cybersecurity strategy, but companies must use the right metrics to determine whether their efforts are working. Continue Reading
-
FAQ: How would the Financial CHOICE Act change current compliance regs?
In this FAQ, we examine how the Financial CHOICE Act of 2017 would change U.S. regulatory compliance mandates targeting the finance industry's business practices. Continue Reading
-
Information security regulations may target IoT, drones
Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult. Continue Reading
-
FAQ: What are the EU-U.S. Privacy Shield compliance requirements?
In this SearchCompliance FAQ, learn details about how the EU-U.S. Privacy Shield data protection requirements strive to raise consumer privacy standards. Continue Reading
-
Q&A: How the deep web is used to exploit protected health information
ICIT Fellow Robert Lord discusses the exploitation of protected health information on the deep web and gives cybersecurity tips on how to best protect these valuable records. Continue Reading
-
Digital risk management strategies for the data-centric business
To offset threats from constantly expanding information volumes, business leaders must rethink how they integrate digital risk management tactics throughout their companies. Continue Reading