Compliance

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a co...

Top 8 Cyber Insurance Companies for 2022

Cyberattacks are not only a technological problem for companies, but they also represent a very real financial threat. That’s where cyber insurance may be able to help. According to the Ponemon Ins...

Top Data Loss Prevention (DLP) Solutions

In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that da...

Data Deletion Methods: What’s Best for Sensitive Data?

Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even experienced IT prof...

Written IT Security Policies: Why You Need Them & How to Create Them

Many security professionals think that if they have done the hard work of securing their organization, that should be enough. There is, however, a next step: Documenting policies. Even though draft...

Three Ways to Protect Unfixable Security Risks

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...

How to Comply with GDPR, PIPL and CCPA

Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA.

China’s Data Privacy Law Poses Challenge for International Companies

Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been cri...

Top IT Asset Management Tools for Security

IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also of...

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

It's been an active week for security vulnerabilities, with MITRE and the U.S. Cybersecurity & Infrastructure Agency (CISA) revealing hundreds of critical vulnerabilities. CISA ordered federal ...

Latest articles