The extra-territorial scope of Europe's General Data Protection Regulation (GDPR) is much more applicable to the new global digital markets of the 21st century, and many other countries, regions and states are following the core principles of GDPR and introducing new data protection and data privacy requirements, such...
A key amendment to Canada's Personal Information Protection and Electronic Documents Act goes into effect on Nov. 1. What are the baseline standards for compliance, and how does this change impact risk transfer and mitigation?
While PIPEDA is not a new law and been on the books for a long time, what is coming is...
Compliance regulations such as SWIFT and GDPR can be challenging to understand and implement. Many of these regulations have cybersecurity requirements that are focused on protecting critical banking infrastructure with aggressive timelines - and without disrupting the very business-critical systems you're trying to...
The European Union's (EU's) General Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal . The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the past; they...
Time is running out. You've heard that costly penalties will be assessed for companies that have been slow to comply with GDPR in late May of 2018. But GDPR should not be viewed as only 'another regulation'. Coming to compliance with GDPR is an opportunity to build trust with consumers as it lays out the privacy...
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Privileged accounts exist in one form or another in virtually every access point in an enterprise. With poor security practices running rampant, the larger the environment, the more challenging it is to maintain an accurate storehouse of information related to these types of accounts.
Download this white paper and...
The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity? Patrick Wardrop of IBM Security shares insights.
The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity?
Download this eBook on the path to modern IAM and learn exclusive insights...
If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.
This whitepaper looks at 5 priveledged access problems and explores how to solve them.
Download this whitepaper and learn how to:
Gain visibility into third party vendor actions in your network;
Make PAM an enabler of employee productivity;
Lock down shared admin account passwords.
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to innovate? Scott Whyte of ClearDATA discusses healthcare's complex convergence of innovation and compliance.
You won't want to miss this report, "A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection," where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform.
To conduct their evaluation, SANS security analysts ran Falcon through a wide range of...
The fact that Federal agencies are prime targets for the most sophisticated cyber threats is undeniable. If cyberattacks are inevitable, then robust capabilities for security investigation, threat hunting, and rapid response are essential. Government cybersecurity professionals require visibility across their silos of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.