Identity & Access October 9, 2018 Out With the Old, In With the New: Separation of Duties the Right Way 3 min read - The capacity to express technical IT concepts in business terms is critical to a better, more informed decision-making process when it comes to user access and separation of duties.
Healthcare October 5, 2018 Why Healthcare Cyberattacks Should Be a Concern for Consumer Data Collectors 3 min read - Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business.
Endpoint October 3, 2018 Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise 3 min read - With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.
Data Protection September 21, 2018 Understanding California’s Consumer Privacy Act: The ‘American GDPR’ 4 min read - Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they'll have a whole new regulatory maze to navigate: California's Consumer Privacy Act.
Risk Management August 28, 2018 Getting Your Organization Up to Speed With SAP GRC 4 min read - There's a growing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy.
Data Protection August 13, 2018 How Will You Solve the Data Classification Conundrum? 4 min read - Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here's what you need to know.
Incident Response July 27, 2018 Incident Response Under GDPR: What to Do Before, During and After a Data Breach 3 min read - With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.
Identity & Access July 16, 2018 How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance 3 min read - The U.S. government's Defense Federal Acquisition Regulation Supplement (DFARS) aims to help the DOD protect its own data and that of its business partners through multifactor authentication (MFA).
July 11, 2018 How Local Privacy Regulations Influence CISO Spending Around the World 2 min read - New privacy regulations in California, the U.K. and other areas are adding to the number of frameworks CISOs say they have to study to make the best internal budgetary decisions.
Data Protection July 11, 2018 The GDPR Evolution: A Letter to the CISO 5 min read - To keep GDPR compliance efforts on track, security leaders must collaborate across departments, invest in robust tools and services and adopt a risk-based approach to handling customer data.