All Data Privacy articles – Page 45
-
Blog
AccelOps Enhances Its Integrated IT Security Platform
AccelOps today announced new enhancements to its integrated IT security and operational intelligence platform that enables IT to rapidly detect, prevent, and respond to malicious attacks. Details inside.
-
Article
FSOC Report Offers Tea Leaves for Future Regulatory Focus
What are the top threats to the U.S. financial system? In a new report, the Financial Stability Oversight Council cites cyber-security, financial innovations, and high-frequency trading among the problems regulators must address. Critics fret, however, that the agency wants “to get rid of the capital markets and replace everything with ...
-
Blog
Actiance Supports Skype for Business and Yammer
Actiance, a compliance, security, archiving and e-Discovery provider for critical business communications, announced that it now supports Skype for Business and Yammer. With Actiance’s extended support, companies can control, monitor and archive all their critical communications as they move to the cloud and as they adopt new communication channels. Details ...
-
Article
Suddenly, Washington Is Back at Cyber-Security Discussion
Image: For the first time in years, Washington is abuzz with proposed changes to cyber-security disclosure, both in Congress and at the SEC. Above all, experts say, is a need to clarify terminology and expectations. “There should be minimum standards for what that security should be across the board,” says ...
-
Resource
e-Book: Cyber-Security: Rising to the Challenge
The risk of critical information falling into the hands of hackers is now higher than ever, and governing information remains a struggle. Worse, the technical nuance associated with cyber-security can be somewhat intimidating for internal auditors and compliance officers. While many organizations are trying to avoid falling victim to a ...
-
Article
Data Governance 101: Getting Started
Amassing terabytes of data is easy; for most businesses, managing those valuable—and sometimes very risky—assets is the hard part. A successful data governance initiative, experts say, isn’t a project you can hand off to the IT department or solve with a software purchase. Compliance, audit, and risk executives all need ...
-
Blog
Weaver Launches New IT Advisory Service
Weaver, an independent accounting firm, recently launched a new IT advisory service that provides payment card industry (PCI) data security assessments. Brian Thomas and Brittany George, both in Weaver’s IT advisory services, have met the necessary requirements to earn the Qualified Security Assessor (QSA) certification from the PCI Security Standards ...
-
Resource
The Elements of Privacy Risk – GRC Illustration
Organizations that handle personal information face increasingly complex challenges to effectively manage privacy risk and compliance. The impact of these challenges covers the entire information life cycle.Whether information is collected to support individual transactions, conduct research or meet legal requirements, the duty to keep that information secure and private arises. ...
-
Blog
Brainloop’s ITAR-Compliant Cloud Solution Now Available for SMBs
Brainloop, a provider of SaaS technology for the secure storage, collaboration, and exchange of confidential documents and files, announced that the ITAR-compliant Brainloop Secure Dataroom is now available for small to medium sized organizations.
-
Blog
BrandProtect Enters Into Reselling Agreement With Sayers
BrandProtect this week announced a reseller agreement with IT and security solutions consulting firm Sayers. Details inside.
-
Article
Preparing Your Board for Cyber-Security Oversight
Every board knows its company will fall victim to a cyber-attack and, worse, that the board will need to clean up the mess and superintend the fallout. This week, guest columnist John Stark, a long-time student of cyber-security risks, breaks down the fundamentals any board must establish for cyber-security, and ...
-
Blog
Why Is Cyber-Security a Process? This Is Why.
Image: Everyone stresses the importance of looking at cyber-security as a process. Well—why, exactly? How does viewing cyber-security that way help compliance and audit executives? Because, Compliance Week Editor Matt Kelly writes, cyber-threats are equally about building effective processes—to subvert yours. And until we appreciate the nature of cyber-risks, he ...
-
Article
Case Study: UCLA, Apps, and HIPAA Compliance
Companies that handle health information are subject to data privacy rules under HIPAA—rules that have grown more complex with the proliferation of mobile health applications (mHealth apps). Those that want to develop mHealth apps in a compliant manner have two options: Build a HIPAA-compliant application of your own, or buy ...
-
Article
NY Regulators Pose New Challenges to Compliance Officers
Image: The state of New York is muscling its way into financial regulation, with regulator Benjamin Lawsky proposing moves in anti-money laundering compliance far more bold than anything the feds are doing. Inside is a look at what the Empire State wants to achieve, and the potentially severe liability CCOs ...
-
Blog
Intronis Winter Release ‘15 Simplifies Hybrid Cloud Backup and Recovery
Intronis, a provider of backup and data protection solutions for the IT channel, this week announced the Winter Release ‘15 of its Intronis ECHOplatform. The Intronis Winter Release ’15 introduces several new business-building features and core functionalities designed to help channel partners better support more complex cloud, virtualized and physical ...
-
Article
Insurers Feel Fresh Heat on Cyber-Security Practices
Image: New York plan to bolster cyber-security oversight in the insurance sector, including regular, targeted assessments of cyber-security as part of its exam process. “Recent cyber-security breaches should serve as a stern wake-up call for insurers and other financial institutions to strengthen their cyber-defenses,” said New York Department of Financial ...
-
Article
An Insider Look at the EU’s Binding Corporate Rules
Companies that move data throughout Europe, or beyond its borders, face a long and exacting list of privacy and security demands. Some companies are choosing to take advantage of Binding Corporate Rules (BCRs), presenting their data compliance framework for approval by data protection authorities. BCRs, despite a lengthy approval process, ...
-
Blog
MetricStream Launches New Cyber-Security Hub
Unified Compliance, developer of the Unified Compliance Framework, and MetricStream, a provider of GRC apps, plan to launch through a joint initiative a new cyber-security hub via MetricStream’s portal ComplianceOnline.com, a GRC advisory network and online community. The cyber-security hub will consolidate and connect all major cyber-security requirements in a ...
-
Article
When State Attorneys General Come Knocking
Sometimes a sheriff arrives from the federal government to take an enforcement action against your company, and sometimes a posse of state attorneys general follow behind, determined to investigate you too. Such is the case for JP Morgan, now being pressed by 19 states for more detail on its massive ...
-
Blog
Anthem Discloses Huge Data Breach
Health insurer Anthem said hackers gained unauthorized access to its IT systems and stole personal information relating to tens of millions of current and former members and employees. Calling it a “very sophisticated external cyber-attack,” Anthem CEO Joseph Swedish said the breach does not appear to have compromised credit card ...