All Data Privacy articles – Page 41

  • Article

    Better cyber-security through better cyber-compliance training

    2016-12-06T09:15:00Z

    The Achilles’ heel of every cyber-security program is compliance. Javvad Malik offers some tips on how the right kind of training can fix that.

  • Blog

    TrapX releases deception-based security solution

    2016-11-21T08:30:00Z

    TrapX, a deception-based cyber-security defense provider, recently released the world’s first deception-based security solution specifically designed to protect the Society for Worldwide Interbank Financial Telecommunication (SWIFT) financial networks.

  • Blog

    Tanium Comply simplifies endpoint security configuration compliance

    2016-10-14T12:00:00Z

    Tanium, an endpoint security and systems management provider, recently launched its latest Tanium product module, Tanium Comply, intended to transform the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints a firm has.

  • ExecutiveSilhouettePhone
    Article

    Fending off executive impersonation schemes

    2016-10-12T09:30:00Z

    Everybody thinks they would never fall for an obvious cyber-scam … until they do. Jaclyn Jaeger reports.

  • Blog

    HPE, Iron Mountain form alliance

    2016-10-03T09:30:00Z

    Hewlett Packard Enterprise has formed a strategic collaboration with Iron Mountain, a storage and information management services firm, to help organizations automate the application and execution of legal policy against their content and information repositories.

  • Blog

    There simply are not enough cyber-security specialists

    2016-09-27T10:30:00Z

    Companies need to get much more aggressive when it comes to recruiting the right talent to head their cyber-security efforts, writes John Reed Stark.

  • Article

    How data analytics is changing the face of compliance

    2016-09-07T12:30:00Z

    Compliance and risk officers are increasingly using data analytics to prevent and detect bribery and corruption risk, as well as enjoy cost and operational efficiencies. Jaclyn Jaeger explores.

  • Article

    Amid corruption scandals, compliance booms in Brazil

    2016-08-09T12:45:00Z

    It might seem that corruption scandals are one of Brazil’s leading exports this year, but amid renewed government anti-bribery enforcement efforts, the country’s compliance sector is growing by leaps and bounds. Rodrigo Amaral has more.

  • Blog

    Business associate to pay $650K for HIPAA violation

    2016-07-27T12:15:00Z

    The Department of Health and Human Services reached its first-ever enforcement action with a “business associate” of a HIPAA-covered entity. Compliance officers in the healthcare industry looking to minimize risk of future HIPAA violations will want to take a look at the resulting corrective action plan for lessons learned. Jaclyn ...

  • Article

    This is not a game: Scenario planning can help protect your organization’s reputation

    2016-07-26T11:30:00Z

    With some 4,000 cyber-attacks occurring every day, compliance officers are looking for any solution to help protect their organization from cyber-risk. A method worth considering is wargaming: a simulation that provides a live example of what a cyber-attack might look like and illustrates what can be to better protect the ...

  • Blog

    K2 Intelligence names head of U.S. business investigations practice

    2016-07-26T10:30:00Z

    K2 Intelligence, an investigative, compliance and cyber-defense services firm, has appointed Snežana Gebauer as executive managing director and head of the U.S. business investigations and intelligence practice.

  • PrivacyShield
    Article

    EU-U.S. Privacy Shield passes: Now what?

    2016-07-26T09:15:00Z

    For any U.S. company that collects and handles data on EU citizens, the time to review privacy policies, practices and contracts with service providers and customers is now. Jaclyn Jaeger has more.

  • Article

    Preparing for the new EU cyber-security directive

    2016-07-19T13:45:00Z

    The European Parliament has greenlit an EU-wide cyber-security initiative that will impose plenty of new compliance requirements on organizations across the board. But, queries Jaclyn Jaeger, will compliance officers feel these are helping protect their organizations, or just adding another layer of regulatory liability?

  • Article

    In cyber-security, the real enemy strikes from within

    2016-07-19T11:45:00Z

    While organizations are trying to understand their cyber-risk and how best to address it, focusing on external threats can overlook an even greater problem, say guest contributors Mark Dorosz and Jennifer Benson: security flaws from internal employees who don’t understand, or don’t care, about upholding the organization’s defenses.

  • Blog

    PhishMe adds healthcare compliance training modules

    2016-07-08T12:30:00Z

    PhishMe, a global provider of phishing defense and intelligence solutions for the enterprise, announced the immediate availability of three new, complimentary computer-based trainings, accessible through the Phis hMe CBFree program. These modules provide employees with a better understanding of the policies, procedure, and reporting when handling protected personal information.

  • Blog

    New solution helps companies reclaim lost data

    2016-06-17T15:00:00Z

    Ground Labs, a global security software company, announced the release of Enterprise Recon 2.0. The solution scans for 100 different data points and personally identifiable information, allowing organizations to protect critical information at every endpoint without relying on antiquated perimeter security methods.

  • Blog

    CipherCloud unveils GDPR-ready cloud security solution

    2016-06-17T14:45:00Z

    CipherCloud, a cloud security company, announced the availability of the industry’s first cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR).

  • Blog

    Cyber-security due diligence: a new imperative

    2016-06-07T10:00:00Z

    Weak cyber-security is as much a hallmark of corporate mismanagement as poor corporate governance, bad tone from the top, and check-the-box compliance. But by taking the due diligence aspects of cyber-security seriously, compliance officers can turn data protection into an opportunity. John Reed Stark has more.

  • Blog

    K2 Intelligence partners with BitVoyant

    2016-05-20T15:15:00Z

    K2 Intelligence, a cyber defense, investigative, and compliance services firm, and BitVoyant, a cyber intelligence services company, has announced a new partnership to co-develop cyber-derived business intelligence products and defense services based on massive proprietary cyber datasets.

  • Article

    The many facets of a data breach

    2016-05-17T20:00:00Z

    Every industry faces the threat of a data breach, but how those breaches are actually carried out can vary significantly industry to industry. Jaclyn Jaeger explores how companies can better focus their security efforts on the most vulnerable areas.