All Data Privacy articles – Page 45

  • Blog

    AccelOps Enhances Its Integrated IT Security Platform

    2015-06-02T14:15:00Z

    AccelOps today announced new enhancements to its integrated IT security and operational intelligence platform that enables IT to rapidly detect, prevent, and respond to malicious attacks. Details inside.

  • Article

    FSOC Report Offers Tea Leaves for Future Regulatory Focus

    2015-06-02T14:00:00Z

    What are the top threats to the U.S. financial system? In a new report, the Financial Stability Oversight Council cites cyber-security, financial innovations, and high-frequency trading among the problems regulators must address. Critics fret, however, that the agency wants “to get rid of the capital markets and replace everything with ...

  • Blog

    Actiance Supports Skype for Business and Yammer

    2015-05-15T14:30:00Z

    Actiance, a compliance, security, archiving and e-Discovery provider for critical business communications, announced that it now supports Skype for Business and Yammer. With Actiance’s extended support, companies can control, monitor and archive all their critical communications as they move to the cloud and as they adopt new communication channels. Details ...

  • Article

    Suddenly, Washington Is Back at Cyber-Security Discussion

    2015-05-12T14:30:00Z

    Image: For the first time in years, Washington is abuzz with proposed changes to cyber-security disclosure, both in Congress and at the SEC. Above all, experts say, is a need to clarify terminology and expectations. “There should be minimum standards for what that security should be across the board,” says ...

  • Resource

    e-Book: Cyber-Security: Rising to the Challenge

    2015-04-30T13:30:00Z Provided by

    The risk of critical information falling into the hands of hackers is now higher than ever, and governing information remains a struggle. Worse, the technical nuance associated with cyber-security can be somewhat intimidating for internal auditors and compliance officers. While many organizations are trying to avoid falling victim to a ...

  • Article

    Data Governance 101: Getting Started

    2015-04-14T14:00:00Z

    Amassing terabytes of data is easy; for most businesses, managing those valuable—and sometimes very risky—assets is the hard part. A successful data governance initiative, experts say, isn’t a project you can hand off to the IT department or solve with a software purchase. Compliance, audit, and risk executives all need ...

  • Blog

    Weaver Launches New IT Advisory Service

    2015-04-10T14:00:00Z

    Weaver, an independent accounting firm, recently launched a new IT advisory service that provides payment card industry (PCI) data security assessments. Brian Thomas and Brittany George, both in Weaver’s IT advisory services, have met the necessary requirements to earn the Qualified Security Assessor (QSA) certification from the PCI Security Standards ...

  • Resource

    The Elements of Privacy Risk – GRC Illustration

    2015-04-08T11:15:00Z Provided by

    Organizations that handle personal information face increasingly complex challenges to effectively manage privacy risk and compliance. The impact of these challenges covers the entire information life cycle.Whether information is collected to support individual transactions, conduct research or meet legal requirements, the duty to keep that information secure and private arises. ...

  • Blog

    Brainloop’s ITAR-Compliant Cloud Solution Now Available for SMBs

    2015-03-20T11:00:00Z

    Brainloop, a provider of SaaS technology for the secure storage, collaboration, and exchange of confidential documents and files, announced that the ITAR-compliant Brainloop Secure Dataroom is now available for small to medium sized organizations.

  • Blog

    BrandProtect Enters Into Reselling Agreement With Sayers

    2015-03-20T10:45:00Z

    BrandProtect this week announced a reseller agreement with IT and security solutions consulting firm Sayers. Details inside.

  • Article

    Preparing Your Board for Cyber-Security Oversight

    2015-03-17T14:15:00Z

    Every board knows its company will fall victim to a cyber-attack and, worse, that the board will need to clean up the mess and superintend the fallout. This week, guest columnist John Stark, a long-time student of cyber-security risks, breaks down the fundamentals any board must establish for cyber-security, and ...

  • Blog

    Why Is Cyber-Security a Process? This Is Why.

    2015-03-11T22:45:00Z

    Image: Everyone stresses the importance of looking at cyber-security as a process. Well—why, exactly? How does viewing cyber-security that way help compliance and audit executives? Because, Compliance Week Editor Matt Kelly writes, cyber-threats are equally about building effective processes—to subvert yours. And until we appreciate the nature of cyber-risks, he ...

  • Article

    Case Study: UCLA, Apps, and HIPAA Compliance

    2015-03-10T14:15:00Z

    Companies that handle health information are subject to data privacy rules under HIPAA—rules that have grown more complex with the proliferation of mobile health applications (mHealth apps). Those that want to develop mHealth apps in a compliant manner have two options: Build a HIPAA-compliant application of your own, or buy ...

  • Article

    NY Regulators Pose New Challenges to Compliance Officers

    2015-03-10T10:15:00Z

    Image: The state of New York is muscling its way into financial regulation, with regulator Benjamin Lawsky proposing moves in anti-money laundering compliance far more bold than anything the feds are doing. Inside is a look at what the Empire State wants to achieve, and the potentially severe liability CCOs ...

  • Blog

    Intronis Winter Release ‘15 Simplifies Hybrid Cloud Backup and Recovery

    2015-03-06T12:45:00Z

    Intronis, a provider of backup and data protection solutions for the IT channel, this week announced the Winter Release ‘15 of its Intronis ECHOplatform. The Intronis Winter Release ’15 introduces several new business-building features and core functionalities designed to help channel partners better support more complex cloud, virtualized and physical ...

  • Article

    Insurers Feel Fresh Heat on Cyber-Security Practices

    2015-03-03T10:00:00Z

    Image: New York plan to bolster cyber-security oversight in the insurance sector, including regular, targeted assessments of cyber-security as part of its exam process. “Recent cyber-security breaches should serve as a stern wake-up call for insurers and other financial institutions to strengthen their cyber-defenses,” said New York Department of Financial ...

  • Article

    An Insider Look at the EU’s Binding Corporate Rules

    2015-02-24T09:30:00Z

    Companies that move data throughout Europe, or beyond its borders, face a long and exacting list of privacy and security demands. Some companies are choosing to take advantage of Binding Corporate Rules (BCRs), presenting their data compliance framework for approval by data protection authorities. BCRs, despite a lengthy approval process, ...

  • Blog

    MetricStream Launches New Cyber-Security Hub

    2015-02-13T10:15:00Z

    Unified Compliance, developer of the Unified Compliance Framework, and MetricStream, a provider of GRC apps, plan to launch through a joint initiative a new cyber-security hub via MetricStream’s portal ComplianceOnline.com, a GRC advisory network and online community. The cyber-security hub will consolidate and connect all major cyber-security requirements in a ...

  • Article

    When State Attorneys General Come Knocking

    2015-02-10T12:00:00Z

    Sometimes a sheriff arrives from the federal government to take an enforcement action against your company, and sometimes a posse of state attorneys general follow behind, determined to investigate you too. Such is the case for JP Morgan, now being pressed by 19 states for more detail on its massive ...

  • Blog

    Anthem Discloses Huge Data Breach

    2015-02-05T11:45:00Z

    Health insurer Anthem said hackers gained unauthorized access to its IT systems and stole personal information relating to tens of millions of current and former members and employees. Calling it a “very sophisticated external cyber-attack,” Anthem CEO Joseph Swedish said the breach does not appear to have compromised credit card ...