The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All

Security practitioners across the US spent most of Thursday, May 13, reading over, hashing, rehashing, and then re-rehashing the “Executive Order on Improving the Nation’s Cybersecurity” (the Executive Order). Between the mandate for agencies to adopt zero trust, short timelines, and the “Software Bill of Materials,” the Executive Order seems ... Read More

Protecting Digital Democracy

With Election Day over, Americans await the final vote counts. As this contentious race coming to a close, securing digital data is now more critical to the democratic process than ever before. With nation-state actors seeking to undermine Americans’ trust in their time-honored process, ransomware attacks on local governments and ... Read More

Security first: Compliance by design

Introduction Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), nearly every regulation or industry standard... Go on to the site to read the full article ... Read More

4 strategies for balancing cybersecurity and business continuity planning during the coronavirus outbreak

| | General Security
Introduction As cybersecurity conferences worldwide cancel events, the impact of the coronavirus (COVID-19) on the industry comes close to home. At least two people who attended the annual RSA... Go on to the site to read the full article ... Read More

What companies need to know about proposed changes to the Gramm-Leach-Bliley Act

| | General Security
Introduction: What is the Gramm-Leach-Bliley Act (GLBA)? Also called the Financial Modernization Act of 1999, GLBA governs the way in which financial institutions must prevent the disclosure of... Go on to the site to read the full article ... Read More

4 predictions for 2020: Looking into the regulatory crystal ball

| | General Security
Introduction Moving into the second month of 2020, data privacy and security is still headline news. At the end of January, the United Nations called for additional investigations into the Jeff Bezos... Go on to the site to read the full article ... Read More

How to satisfy HIPAA awareness and training requirements

| | General Security
Introduction While data privacy and security regulations abound, few bring the same number of frustrated groans from IT departments as the Health Insurance Portability and Accountability Act... Go on to the site to read the full article ... Read More