Compliance

Most Organizations Do DMARC Wrong. Here’s How to Do It Right.

When organizations implement Domain-based Message Authentication, Reporting and Conformance (DMARC), they expect to tighten email security and protect against spoofing and other spam email attacks. U...

15 Top Cybersecurity Certifications for 2022

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training a...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a co...

Top 8 Cyber Insurance Companies for 2022

Cyberattacks are not only a technological problem for companies, but they also represent a very real financial threat. That’s where cyber insurance may be able to help. According to the Ponemon Ins...

Top Data Loss Prevention (DLP) Solutions

In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that da...

Data Deletion Methods: What’s Best for Sensitive Data?

Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even experienced IT prof...

Written IT Security Policies: Why You Need Them & How to Create Them

Many security professionals think that if they have done the hard work of securing their organization, that should be enough. There is, however, a next step: Documenting policies. Even though draft...

Three Ways to Protect Unfixable Security Risks

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...

How to Comply with GDPR, PIPL and CCPA

Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA.

Latest articles