GDPR

GDPR: One Year On, Lessons Learned

On May 25, 2018, the EU rolled out a new set of data privacy laws under the General Data Protection Regulation, more commonly known as GDPR. The aim of GDPR was to ...
Security Boulevard

NIST SP 1800-23, Energy Sector Asset Management: Securing Industrial Control Systems

Industrial organizations face a growing list of digital threats these days. Back in April 2019, for instance, FireEye revealed that it had observed an additional intrusion by the threat group behind the ...
Incorporating Privacy by Design in a Software Development Life-cycle

Incorporating Privacy by Design in a Software Development Life-cycle

With digital transformation being a key driver in how data is used and shared across systems to help drive innovation as well as improve customer experiences, privacy continues to be an important ...

Understanding APIs: REST

| | security operations
Security orchestration, automation and response (SOAR) platforms rely heavily on APIs (application programming interfaces) to drive orchestration of disparate security tools (products) and invoke desired responses in the form of actions. Besides ...

Revisiting The Concepts of Disaster Recovery and Risk as Organizations Move Their Infrastructure To The Cloud

The calculus for disaster recovery and risk management is changing. Most small businesses within the past decade would often keep many of their critical technology assets locally, perhaps in a server closet, ...

Infographic: The Anatomy of Security Operations Pro

A unique genetic makeup is required to be a security operations professional. Analysts, engineers, managers act as the primary digital... The post Infographic: The Anatomy of Security Operations Pro appeared first on ...
CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

CCPA:  Data Privacy like GDPR; Data Security like PCI DSS

Comparisons have already been drawn about the California Consumer Privacy Act (CCPA), calling it ‘the GDPR for California residents.’ However, drawing comparisons to PCI DSS as the title suggests may cause some ...
HIPAA

Health Care and HIPAA-Compliant Data Storage

HIPAA-compliant data storage involves implementing both physical and digital safeguards designed to protect sensitive health information from a growing number of threats. Though global ransomware attacks are on the decline, healthcare organizations ...
Security Boulevard

What is NEI 08-09?

Most organizations with industrial control systems (ICS) fall into one of two categories: regulated and non-regulated. For those subject to government imposed regulatory requirements, the selection of a cybersecurity framework is obviously ...
risk management

Getting on Top of Enterprise Cyber Risk Management

It’s common for two people to discuss enterprise cyber risk management without sharing a common understanding of the topic. What is enterprise cyber risk management, anyway? The answer can vary within an ...
Security Boulevard
Loading...