New regulation requires all financial institutions in New York City to conduct thorough risk assessments for application security and other IT issues and implement programs to address those risks.
The sweeping General Data Protection Regulation (GDPR) from the European Union (EU) intends to revolutionize the relationships of data holders or processors and the people associated with that data.
Meeting the European Union's GDPR compliance has been a source of continuing difficulty and discussion for businesses.
Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.
To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.
The first step toward achieving GDPR readiness is to locate your sensitive assets and identify weaknesses in your data security infrastructure. After all, you can't protect what you don't know.
Risky configurations have led 51 percent of organizations to expose a cloud storage device, according to research report calling for greater attention to cloud security solutions.
A recent survey conducted by IBM Security and the IBM Institute for Business Value found that many organizations around the world are embracing GDPR compliance as an opportunity for innovation.
Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.