Managing compliance operations News
March 25, 2019
FEMA's data exposure is another high-profile example of accidental data disclosures -- a trend that has some security experts calling for more focus on failed security controls.
February 07, 2019
Reinvesting in SOCs and crafting clear risk appetite statements made the list of Gartner's top security and risk management trends. Experts sound off on what's driving these trends.
December 19, 2018
The top 2018 cybersecurity and compliance articles make a few things clear: digitization increases risk and requires innovative strategies to protect against evolving data threats.
November 16, 2018
Extended product lifecycles, consumer apathy and lacking federal regulation lead the top IoT security challenges in corporate settings.
Managing compliance operations Get Started
Bring yourself up to speed with our introductory content
Compliance regulations can be complicated to follow, particularly in the new age of data privacy. Here's a breakdown of the must-know terms for companies who are subject to GDPR. Continue Reading
The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks. Continue Reading
Smart tech promises security and other benefits, but they don't come automatically. Learn how these tools work and where they can work best in your organization. Continue Reading
Evaluate Managing compliance operations Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Attorney and IT security expert Scott Giordano discusses how the growing number of state data privacy laws are changing CISOs' information management role. Continue Reading
Tufin Technical Director Joe Schreiber highlights how automating security operations can benefit an organization and discusses best practices for effective implementation. Continue Reading
Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7. Continue Reading
Manage Managing compliance operations
Learn to apply best practices and optimize your operations.
Compliance rules like GDPR and the CCPA require a fresh look at companies' data classification policy, and particularly how it defines its wide variety of unstructured data. Continue Reading
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense. Continue Reading
Is your organization ready to build a computer security incident response team? Here are the questions that should be answered when building a CSIRT to maximize incident response capability. Continue Reading
Problem Solve Managing compliance operations Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this Ask the Expert, IT governance expert Jeffrey Ritter discusses his formula to successfully align new technology with ITSM compliance standards -- all while minimizing risk. Continue Reading
The GDPR deadline has long passed, but U.S. companies remain behind on compliance. Experts provide GDPR compliance tips to make sure IT is on the right side of the privacy rules. Continue Reading
As IT executives continue to wrap their heads around GDPR, strategies are emerging to ease its data management compliance burden. Here are five that are already proving effective. Continue Reading