Governance, Risk & Compliance

Vertafore Leak: Private Data of 28M Texans

An insurance software vendor ’fessed up to losing control of a huge cache of personal data. Vertafore lost the details of…

1 month ago

On Blockchain Voting

Blockchain voting is a spectacularly dumb idea for a whole bunch of reasons. I have generally quoted Matt Blaze: Why…

1 month ago

7 Challenges that Stand in the Way of Your Compliance Efforts

Compliance is very important to any organization. Organizations have many standards to choose from including PCI, CIS, NIST and so…

1 month ago

How Data-Centric Security Enables Cross-Regulatory Compliance

GDPR. CCPA. HIPAA. PCI DSS. The number of acronyms within the data security and privacy sphere is forever mounting as…

1 month ago

Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356

One of the major improvements that the avionics industry is undergoing is an Internet of Things (IoT) upgrade. And this…

1 month ago

NIST SP 800-53 Compliance Checklist for IT Admins

Learn about NIST SP 800-53 and use this checklist to secure user identities and access and to prepare for compliance.…

1 month ago

Can I Use Google With LDAP?

Google Suite, also known as Google Workspace, is many people’s go to cloud-based productivity suite. G-Suite is a collection of…

1 month ago

Privacy Mindset: Europe vs. United States

In episode 146 for November 9th 2020: My conversation with Kelly Finnerty, Director of Brand and Content for Startpage.com on…

1 month ago

SOC 2 Compliance – Building Customer Trust

With the rapid adoption of new technologies (SaaS, cloud, etc.) and limited resources, many organizations will partner with Service Providers…

1 month ago