Compliance

Security, Compliance Risks Complicate Cloud Migration Efforts
Security and compliance risks are ranked as among the top barriers to achieving value from investments moving to the cloud as organizations grapple with what they consider an “urgent priority,” according to ...
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates
The Office for Civil Rights (OCR) within the U.S. Department of Health and Human Services (HHS) has issued clarification on obligations for HIPAA-covered entities and business associates (regulated entities) under the HIPAA ...

Complete Compliance: Actionable Evidence Versus Simple Integrations
Raw data is not "audit-ready" evidence. Read more to learn why, and how Trustero Compliance as a Service delivers true, actionable evidence. The post Complete Compliance: Actionable Evidence Versus Simple Integrations appeared ...

Better Together: Why Data Security and Privacy Go Hand-in-Hand
It’s Data Privacy Day this coming Saturday (January 28) – another chance to remind consumers and organizations of the importance of protecting personal information. From a corporate perspective, it couldn’t have come ...

New Ransomware Payment Reporting Requirements on Horizon
January 9, 2023, was the deadline for financial services companies doing business in New York (including cryptocurrency entities with a Bit license) to comment on new proposed cybersecurity regulations which would mandate, ...
Obsidian’s Security and Privacy Compliance Journey
The objective of Data Privacy Week has always been to remind individuals that their privacy is important, and that they have a right to make informed decisions about where their data resides ...

The Death of RFPs
Technology spending continues to grow, despite the challenges presented by recessions, inflation and an increasingly tense global environment. Corporations are being forced to evolve faster than ever before, adopting new technologies and ...

FCC To Revamp Breach Reporting, Shorten Waiting Period
The Federal Communications Commission (FCC) is stepping up the pressure on telecom companies to immediately report breaches to law enforcement and consumers. Until now, telecoms have enjoyed a seven-day waiting period between ...

Supply chain security and compliance: Why software organizations should get out in front of requirements
Get out in front of software supply chain compliance requirements for a competitive advantage. Here's what your software organization needs to know ...

ISO 27001 Certification: 4 Things to Do (and 4 Things to Avoid) for Success
Learn some essential initial steps (and obstacles to avoid) for successful ISO 27001 compliance, and about a complete solution from Trustero. The post ISO 27001 Certification: 4 Things to Do (and 4 ...