All Data Security articles
-
Article
Survey: Automating entity management greatly reduces compliance risk
A new study from Compliance Week and Diligent finds that many companies are still using unsecure and inefficient entity management processes, leaving them vulnerable to compliance risk.
-
Blog
Delete your accounts. All of them
The porous nature of data security is worse than we thought. Maybe the only way for anyone to really secure their digital presence is to destroy it.
-
Blog
Expanded Micro Focus portfolio delivers better threat detection, security
Following its spin-merge with HPE Software, Micro Focus, a global enterprise software company, recently announced new innovations across its expanded security portfolio.
-
Blog
KnowBe4 releases weak password test tool
IT security company KnowBe4 recently announced the release of Weak Password Test (WPT), a free tool for organizations that use Active Directory.
-
Blog
‘Being data compliant does not equate to having data security’
Protecting your data involves more than simply following the paper program rules and regulations—you actually must focus on data security.
-
Blog
Some key cyber-security tips for financial firms
As the SEC and FINRA are taking cyber-security much more seriously, John Reed Stark outlines a few ways in which financial firms can also do more to protect their data.
-
Article
Global business in Trump’s protectionist era
Trump’s election, Brexit, and failed trade agreements herald a new era of protectionism, but only strong regulations can deal with data protection and tax evasion, writes Nick Henderson.
-
Article
New York’s proposed cyber-security compliance challenge
Starting in January, strict new rules form the Empire State will require compliance officers to make sure their organizations make the grade when it comes to data protection. More from Todd Taylor.
-
Article
Better cyber-security through better cyber-compliance training
The Achilles’ heel of every cyber-security program is compliance. Javvad Malik offers some tips on how the right kind of training can fix that.
-
Article
Fending off executive impersonation schemes
Everybody thinks they would never fall for an obvious cyber-scam … until they do. Jaclyn Jaeger reports.
-
Blog
Machine Learning capabilities drive new Splunk products
Splunk, a software platform provider for real-time operational intelligence, has released several new versions of its suite of Splunk products: Splunk Enterprise, Splunk IT Service Intelligence, Splunk Enterprise Security, and Splunk User Behavior Analytics. Available on-premises or in the cloud, the newest versions of Splunk solutions leverage machine learning to ...
-
Blog
There simply are not enough cyber-security specialists
Companies need to get much more aggressive when it comes to recruiting the right talent to head their cyber-security efforts, writes John Reed Stark.
-
Blog
Rapid7 Nexpose Now offers live exposure management
Rapid7, a provider of security data and analytics solutions, announced Rapid7 Nexpose Now, a major enhancement to its vulnerability management solution that gives customers access to live risk and exposure updates as IT environments change.
-
Blog
Cyber-security due diligence: a new imperative
Weak cyber-security is as much a hallmark of corporate mismanagement as poor corporate governance, bad tone from the top, and check-the-box compliance. But by taking the due diligence aspects of cyber-security seriously, compliance officers can turn data protection into an opportunity. John Reed Stark has more.
-
Article
Preparing for a HIPAA compliance audit
The Department of Health and Human Services’ Office for Civil Rights has officially kicked off its second phase of audits for covered entities and their business associates to review compliance with the Health Insurance Portability and Accountability Act’s privacy, security, and breach notification rules. CW’s Jaclyn Jaeger says healthcare CCOs ...
-
Article
Healthcare, ransomware, and effective cyber-security hygiene
Imagine this: You’re a large healthcare provider whose staff is having trouble accessing vital records in your hospital’s computer network. Your IT department begins an immediate investigation and determines the cause to be a malware attack. Worse yet, the attackers are demanding ransom to obtain the decryption key. How do ...
-
Blog
EU, U.S. Agree on New Safe Harbor Framework
The European Union and the United States have agreed on a new framework that will allow for trans-Atlantic data flows between Europe and the United States. The new arrangement will provide stronger obligations on U.S. companies to protect the personal data of Europeans and stronger monitoring and enforcement by the ...
-
Blog
Internal Controls Trump New Rules in List of Worries, KPMG Finds
According to a recent KPMG poll, continued pressure on internal control over financial reporting is the most pressing concern for financial reporting executives. Nearly one-third of 400 respondents, or 31 percent, said internal controls are at the top of their worry list beyond their basic financial reporting responsibilities. One-fourth, or ...
-
Article
Cloud Security Is a Challenge for Users and Providers
As more cloud storage providers evolve from consumer-based products to enterprise-grade services, compliance challenges are evolving along with them. Before entering into a service contract, companies must determine whether their data will be safe and all is in compliance with a growing list of regulations and security frameworks. The added ...
-
Article
Managing Cyber-Risk in the Aviation Industry
Cyber-risks are increasing everywhere, and this week we look specifically at the aerospace sector. Recent high-profile data breaches at major airlines have jolted the industry, which is trying to piece together better ways to manage the risks. “Airplanes themselves have never been more complex, never been more reliant on technology. ...