compliance

3 Governance, Risk and Compliance Trends to Watch

 The compliance space is constantly changing. Simply put, being compliant means obeying the rules. The complexity is high for organizations operating across multiple geographies with multiple sets of standards and regulations, leading ...
Security Boulevard
Screen Shot 2020-03-31 at 3.50.23 PM

Work From Home, Securely

Working from home went from a luxury to a necessity in most parts of the world this month. For CISOs around the world, this brings various security challenges. Working from home or ...
Businessman working with a Cloud Computing diagram on the new computer interface

Why Forego Health: WFH Securely through the Cloud

Companies across all verticals are facing the unfortunate reality of the current situation. Cautionary measures to flatten the curve have prompted a rapidly growing number of employees to join the Work From ...
Voice of the Customer

Don’t Take Our Word for It – Listen to Our Customers

Gartner’s Voice of the Customer series (which to date (since October 2015) has featured well over 320,000 reviews across more than 330 markets), has played a key role in educating organizations about ...
data lifecycle

Storage Is Your Data Lifecycle Weak Spot

Privacy regulations have put more emphasis on data security. When we talk about data security and privacy, it’s often discussed as though the protection covers everything equally. But all data isn’t equal; ...
Security Boulevard
Elegant hand holding tablet with virtual database and network concept

Leading Analyst Overheard: Bitglass SmartEdge Tech is SASE on Steroids

Applications moving to the cloud and increased user mobility are changing the way networking and network security services are delivered. We at Bitglass firmly believe that the future of network security is ...
Directory Users and Computers Reporting

Directory Users and Computers Reporting

IT security and compliance baselines require up-to-date, accurate reporting on the user and computer accounts in your directory. Here’s how to generate these reports. The post Directory Users and Computers Reporting appeared ...
Preparing Clients for HIPAA as an MSP

Preparing Clients for HIPAA as an MSP

Do your healthcare clients need to prepare for a HIPAA audit? With cloud IAM, an MSP can remotely manage their clients for compliance. The post Preparing Clients for HIPAA as an MSP ...

The War of Passwords: Compliance vs NIST

The most recent National Institute of Standards and Technology (NIST) guidelines have been updated for passwords in section 800-63B. The document no longer recommends combinations of capital letters, lower case letters, numbers ...
data privacy

Meeting Trusted Data Privacy Compliance

The global privacy game has emerged as one of the most important aspects of compliance and data governance. With the European Union’s vaunted GDPR and the California Consumer Privacy Act (CCPA), we ...
Security Boulevard