compliance cloud security

Security, Compliance Risks Complicate Cloud Migration Efforts 

Security and compliance risks are ranked as among the top barriers to achieving value from investments moving to the cloud as organizations grapple with what they consider an “urgent priority,” according to ...
Security Boulevard

Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates

The Office for Civil Rights (OCR) within the U.S. Department of Health and Human Services (HHS) has issued clarification on obligations for HIPAA-covered entities and business associates (regulated entities) under the HIPAA ...
A banner offering a demo of Trustero Compliance as a Service (CaaS)

Complete Compliance: Actionable Evidence Versus Simple Integrations

Raw data is not "audit-ready" evidence. Read more to learn why, and how Trustero Compliance as a Service delivers true, actionable evidence. The post Complete Compliance: Actionable Evidence Versus Simple Integrations appeared ...
Better Together: Why Data Security and Privacy Go Hand-in-Hand

Better Together: Why Data Security and Privacy Go Hand-in-Hand

It’s Data Privacy Day this coming Saturday (January 28) – another chance to remind consumers and organizations of the importance of protecting personal information. From a corporate perspective, it couldn’t have come ...
ransomware SaaS Security

New Ransomware Payment Reporting Requirements on Horizon

| | cisa, Compliance, NYDFS, Ransomware
January 9, 2023, was the deadline for financial services companies doing business in New York (including cryptocurrency entities with a Bit license) to comment on new proposed cybersecurity regulations which would mandate, ...
Security Boulevard

Obsidian’s Security and Privacy Compliance Journey

The objective of Data Privacy Week has always been to remind individuals that their privacy is important, and that they have a right to make informed decisions about where their data resides ...
privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

The Death of RFPs

Technology spending continues to grow, despite the challenges presented by recessions, inflation and an increasingly tense global environment. Corporations are being forced to evolve faster than ever before, adopting new technologies and ...
Security Boulevard
breach API attacker Radware Report Sees Major Spike in DDoS Attacks

FCC To Revamp Breach Reporting, Shorten Waiting Period

The Federal Communications Commission (FCC) is stepping up the pressure on telecom companies to immediately report breaches to law enforcement and consumers. Until now, telecoms have enjoyed a seven-day waiting period between ...
Security Boulevard
Supply chain security and compliance: Why software organizations should get out in front of requirements

Supply chain security and compliance: Why software organizations should get out in front of requirements

Get out in front of software supply chain compliance requirements for a competitive advantage. Here's what your software organization needs to know ...
A banner offering a demo of Trustero Compliance as a Service (CaaS)

ISO 27001 Certification: 4 Things to Do (and 4 Things to Avoid) for Success

Learn some essential initial steps (and obstacles to avoid) for successful ISO 27001 compliance, and about a complete solution from Trustero. The post ISO 27001 Certification: 4 Things to Do (and 4 ...